Vulnerability Details CVE-2026-32287
Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.9%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-32287
-
cpe:2.3:a:antchfx:xpath:1.0.0
-
cpe:2.3:a:antchfx:xpath:1.1.0
-
cpe:2.3:a:antchfx:xpath:1.1.1
-
cpe:2.3:a:antchfx:xpath:1.1.10
-
cpe:2.3:a:antchfx:xpath:1.1.11
-
cpe:2.3:a:antchfx:xpath:1.1.2
-
cpe:2.3:a:antchfx:xpath:1.1.3
-
cpe:2.3:a:antchfx:xpath:1.1.4
-
cpe:2.3:a:antchfx:xpath:1.1.5
-
cpe:2.3:a:antchfx:xpath:1.1.6
-
cpe:2.3:a:antchfx:xpath:1.1.7
-
cpe:2.3:a:antchfx:xpath:1.1.8
-
cpe:2.3:a:antchfx:xpath:1.1.9
-
cpe:2.3:a:antchfx:xpath:1.2.0
-
cpe:2.3:a:antchfx:xpath:1.2.1
-
cpe:2.3:a:antchfx:xpath:1.2.2
-
cpe:2.3:a:antchfx:xpath:1.2.3
-
cpe:2.3:a:antchfx:xpath:1.2.4
-
cpe:2.3:a:antchfx:xpath:1.2.5
-
cpe:2.3:a:antchfx:xpath:1.3.0
-
cpe:2.3:a:antchfx:xpath:1.3.1
-
cpe:2.3:a:antchfx:xpath:1.3.2
-
cpe:2.3:a:antchfx:xpath:1.3.3
-
cpe:2.3:a:antchfx:xpath:1.3.4
-
cpe:2.3:a:antchfx:xpath:1.3.5