A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 23 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system. | |
| Title | Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions | |
| First Time appeared |
Redhat
Redhat acm Redhat enterprise Linux Redhat migration Toolkit Applications Redhat openshift Redhat openshift Compliance Operator Redhat openshift Distributed Tracing Redhat openshift File Integrity Operator |
|
| Weaknesses | CWE-835 | |
| CPEs | cpe:/a:redhat:acm:2 cpe:/a:redhat:migration_toolkit_applications:8 cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift_compliance_operator:1 cpe:/a:redhat:openshift_distributed_tracing:3 cpe:/a:redhat:openshift_file_integrity_operator:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat acm Redhat enterprise Linux Redhat migration Toolkit Applications Redhat openshift Redhat openshift Compliance Operator Redhat openshift Distributed Tracing Redhat openshift File Integrity Operator |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-23T15:00:36.532Z
Reserved: 2026-03-23T12:21:39.096Z
Link: CVE-2026-4645
No data.
Status : Awaiting Analysis
Published: 2026-03-23T14:16:36.063
Modified: 2026-03-23T14:31:37.267
Link: CVE-2026-4645
No data.
OpenCVE Enrichment
No data.
Weaknesses