VYPR
High severity7.5NVD Advisory· Published Mar 26, 2026· Updated Apr 21, 2026

CVE-2026-32287

CVE-2026-32287

Description

Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/antchfx/xpathGo
< 1.3.61.3.6

Affected products

1
  • cpe:2.3:a:antchfx:xpath:*:*:*:*:*:go:*:*
    Range: <1.3.6

Patches

1
afd4762cc342

fix #121

https://github.com/antchfx/xpathzhengchunFeb 21, 2026via ghsa
1 file changed · +0 9
  • query.go+0 9 modified
    @@ -985,15 +985,6 @@ type logicalQuery struct {
     }
     
     func (l *logicalQuery) Select(t iterator) NodeNavigator {
    -	// When a XPath expr is logical expression.
    -	node := t.Current().Copy()
    -	val := l.Evaluate(t)
    -	switch val.(type) {
    -	case bool:
    -		if val.(bool) == true {
    -			return node
    -		}
    -	}
     	return nil
     }
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.