๐Ÿ” CVE Alert

CVE-2026-32287

HIGH 7.5

Infinite loop in github.com/antchfx/xpath

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
4th

Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".

Vendor github.com/antchfx/xpath
Product github.com/antchfx/xpath
Published Mar 26, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for github.com/antchfx/xpath github.com/antchfx/xpath

Be the first to know when new high vulnerabilities affecting github.com/antchfx/xpath github.com/antchfx/xpath are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

github.com/antchfx/xpath / github.com/antchfx/xpath
0 < 1.3.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/antchfx/xpath/issues/121 github.com: https://github.com/antchfx/xpath/commit/afd4762cc342af56345a3fb4002a59281fcab494 github.com: https://github.com/golang/vulndb/issues/4526 pkg.go.dev: https://pkg.go.dev/vuln/GO-2026-4526 securityinfinity.com: https://securityinfinity.com/research/infinite-loop-dos-in-antchfx-xpath-logicalquery-select