Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".
References
| Link | Resource |
|---|---|
| https://github.com/antchfx/xpath/commit/afd4762cc342af56345a3fb4002a59281fcab494 | Patch |
| https://github.com/antchfx/xpath/issues/121 | Issue Tracking Third Party Advisory |
| https://github.com/golang/vulndb/issues/4526 | Issue Tracking Third Party Advisory |
| https://pkg.go.dev/vuln/GO-2026-4526 | Third Party Advisory |
| https://securityinfinity.com/research/infinite-loop-dos-in-antchfx-xpath-logicalquery-select | Exploit Third Party Advisory |
Configurations
History
21 Apr 2026, 15:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/antchfx/xpath/commit/afd4762cc342af56345a3fb4002a59281fcab494 - Patch | |
| References | () https://github.com/antchfx/xpath/issues/121 - Issue Tracking, Third Party Advisory | |
| References | () https://github.com/golang/vulndb/issues/4526 - Issue Tracking, Third Party Advisory | |
| References | () https://pkg.go.dev/vuln/GO-2026-4526 - Third Party Advisory | |
| References | () https://securityinfinity.com/research/infinite-loop-dos-in-antchfx-xpath-logicalquery-select - Exploit, Third Party Advisory | |
| CWE | CWE-835 | |
| First Time |
Antchfx xpath
Antchfx |
|
| CPE | cpe:2.3:a:antchfx:xpath:*:*:*:*:*:go:*:* |
30 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 20:16
Updated : 2026-04-21 15:33
NVD link : CVE-2026-32287
Mitre link : CVE-2026-32287
CVE.ORG link : CVE-2026-32287
JSON object : View
Products Affected
antchfx
- xpath
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
