Vulnerability Description
Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Antchfx | Xpath | < 1.3.6 |
Related Weaknesses (CWE)
References
- https://github.com/antchfx/xpath/commit/afd4762cc342af56345a3fb4002a59281fcab494Patch
- https://github.com/antchfx/xpath/issues/121Issue TrackingThird Party Advisory
- https://github.com/golang/vulndb/issues/4526Issue TrackingThird Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4526Third Party Advisory
- https://securityinfinity.com/research/infinite-loop-dos-in-antchfx-xpath-logicalExploitThird Party Advisory
FAQ
What is CVE-2026-32287?
CVE-2026-32287 is a vulnerability with a CVSS score of 7.5 (HIGH). Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".
How severe is CVE-2026-32287?
CVE-2026-32287 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32287?
Check the references section above for vendor advisories and patch information. Affected products include: Antchfx Xpath.