← Volver a CVEs
CVE-2026-32287
HIGH7.5
Descripcion
Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/26/2026
Ultima modificacion3/30/2026
Fuentenvd
Avistamientos honeypot0
Referencias
https://github.com/antchfx/xpath/commit/afd4762cc342af56345a3fb4002a59281fcab494(security@golang.org)
https://github.com/antchfx/xpath/issues/121(security@golang.org)
https://github.com/golang/vulndb/issues/4526(security@golang.org)
https://pkg.go.dev/vuln/GO-2026-4526(security@golang.org)
https://securityinfinity.com/research/infinite-loop-dos-in-antchfx-xpath-logicalquery-select(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.