A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.

Project Subscriptions

Vendors Products
Advanced Cluster Management For Kubernetes Subscribe
Enterprise Linux Subscribe
Migration Toolkit Applications Subscribe
Migration Toolkit For Applications Subscribe
Openshift Subscribe
Openshift Compliance Operator Subscribe
Openshift Container Platform Subscribe
Openshift Distributed Tracing Subscribe
Openshift File Integrity Operator Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

To mitigate this issue, restrict the processing of untrusted or unvalidated XPath expressions by applications which utilize the `github.com/antchfx/xpath` component. Implement input validation and sanitization for all XPath expressions originating from external or untrusted sources. If possible, configure applications to only process XPath expressions from trusted sources or disable features that allow arbitrary XPath expression evaluation.

History

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat advanced Cluster Management For Kubernetes
Redhat migration Toolkit For Applications
Redhat openshift Container Platform
Vendors & Products Redhat advanced Cluster Management For Kubernetes
Redhat migration Toolkit For Applications
Redhat openshift Container Platform

Tue, 24 Mar 2026 02:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Mon, 23 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
Title Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions
First Time appeared Redhat
Redhat acm
Redhat enterprise Linux
Redhat migration Toolkit Applications
Redhat openshift
Redhat openshift Compliance Operator
Redhat openshift Distributed Tracing
Redhat openshift File Integrity Operator
Weaknesses CWE-835
CPEs cpe:/a:redhat:acm:2
cpe:/a:redhat:migration_toolkit_applications:8
cpe:/a:redhat:openshift:4
cpe:/a:redhat:openshift_compliance_operator:1
cpe:/a:redhat:openshift_distributed_tracing:3
cpe:/a:redhat:openshift_file_integrity_operator:1
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat acm
Redhat enterprise Linux
Redhat migration Toolkit Applications
Redhat openshift
Redhat openshift Compliance Operator
Redhat openshift Distributed Tracing
Redhat openshift File Integrity Operator
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-24T17:08:38.672Z

Reserved: 2026-03-23T12:21:39.096Z

Link: CVE-2026-4645

cve-icon Vulnrichment

Updated: 2026-03-23T15:00:32.836Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T14:16:36.063

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4645

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-17T20:58:59Z

Links: CVE-2026-4645 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:34:00Z

Weaknesses