← Retour aux CVEs
CVE-2026-32287
HIGH7.5
Description
Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/26/2026
Derniere modification3/30/2026
Sourcenvd
Observations honeypot0
References
https://github.com/antchfx/xpath/commit/afd4762cc342af56345a3fb4002a59281fcab494(security@golang.org)
https://github.com/antchfx/xpath/issues/121(security@golang.org)
https://github.com/golang/vulndb/issues/4526(security@golang.org)
https://pkg.go.dev/vuln/GO-2026-4526(security@golang.org)
https://securityinfinity.com/research/infinite-loop-dos-in-antchfx-xpath-logicalquery-select(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.