Project Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
Acm
Subscribe
Advanced Cluster Management For Kubernetes
Subscribe
Enterprise Linux
Subscribe
Migration Toolkit Applications
Subscribe
Migration Toolkit For Applications
Subscribe
Openshift
Subscribe
Openshift Compliance Operator
Subscribe
Openshift Container Platform
Subscribe
Openshift Distributed Tracing
Subscribe
Openshift File Integrity Operator
Subscribe
|
No advisories yet.
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, restrict the processing of untrusted or unvalidated XPath expressions by applications which utilize the `github.com/antchfx/xpath` component. Implement input validation and sanitization for all XPath expressions originating from external or untrusted sources. If possible, configure applications to only process XPath expressions from trusted sources or disable features that allow arbitrary XPath expression evaluation.
Tue, 24 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat advanced Cluster Management For Kubernetes
Redhat migration Toolkit For Applications Redhat openshift Container Platform |
|
| Vendors & Products |
Redhat advanced Cluster Management For Kubernetes
Redhat migration Toolkit For Applications Redhat openshift Container Platform |
Tue, 24 Mar 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 23 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system. | |
| Title | Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions | |
| First Time appeared |
Redhat
Redhat acm Redhat enterprise Linux Redhat migration Toolkit Applications Redhat openshift Redhat openshift Compliance Operator Redhat openshift Distributed Tracing Redhat openshift File Integrity Operator |
|
| Weaknesses | CWE-835 | |
| CPEs | cpe:/a:redhat:acm:2 cpe:/a:redhat:migration_toolkit_applications:8 cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift_compliance_operator:1 cpe:/a:redhat:openshift_distributed_tracing:3 cpe:/a:redhat:openshift_file_integrity_operator:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat acm Redhat enterprise Linux Redhat migration Toolkit Applications Redhat openshift Redhat openshift Compliance Operator Redhat openshift Distributed Tracing Redhat openshift File Integrity Operator |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-24T17:08:38.672Z
Reserved: 2026-03-23T12:21:39.096Z
Link: CVE-2026-4645
Updated: 2026-03-23T15:00:32.836Z
Status : Awaiting Analysis
Published: 2026-03-23T14:16:36.063
Modified: 2026-03-23T14:31:37.267
Link: CVE-2026-4645
OpenCVE Enrichment
Updated: 2026-03-24T10:34:00Z