<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Xpath — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/xpath/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 15:19:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/xpath/feed.xml" rel="self" type="application/rss+xml"/><item><title>XPath Boolean Expression DoS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-xpath-dos/</link><pubDate>Sun, 29 Mar 2026 15:19:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-xpath-dos/</guid><description>A vulnerability in the antchfx/xpath package allows for denial of service via CPU exhaustion by exploiting boolean expressions that evaluate to true, leading to an infinite loop.</description><content:encoded><![CDATA[<p>A denial-of-service vulnerability exists in the <code>antchfx/xpath</code> Go package, specifically in versions prior to 1.3.6. The vulnerability, identified as CVE-2026-32287, stems from the way the <code>logicalQuery.Select</code> function handles boolean expressions. When expressions that always evaluate to true, such as &ldquo;1=1&rdquo; or &ldquo;true()&rdquo;, are used as top-level selectors, they can trigger an infinite loop within the function. This results in the affected system consuming 100% of CPU resources, effectively denying service to legitimate users. The vulnerability was published on March 29, 2026, and patched in version 1.3.6.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious XPath expression containing a boolean expression that always evaluates to true, such as &ldquo;1=1&rdquo; or &ldquo;true()&rdquo;.</li>
<li>The attacker sends this malicious XPath expression to an application that uses the vulnerable <code>antchfx/xpath</code> package.</li>
<li>The application parses the XPath expression using the <code>logicalQuery.Select</code> function.</li>
<li>Due to the nature of the expression, the <code>logicalQuery.Select</code> function enters an infinite loop.</li>
<li>The infinite loop consumes excessive CPU resources.</li>
<li>The application becomes unresponsive due to CPU exhaustion.</li>
<li>Legitimate users are unable to access the application.</li>
<li>The system experiences a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition. An affected server or application becomes unresponsive, impacting all users who rely on the service. While the vulnerability does not directly compromise data confidentiality or integrity, it can severely disrupt operations. The number of potential victims depends on the scope and deployment of applications utilizing the vulnerable <code>antchfx/xpath</code> package.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>antchfx/xpath</code> package to version 1.3.6 or later to patch CVE-2026-32287.</li>
<li>Deploy the Sigma rule <code>Detect XPath Boolean Expression DoS Attempt</code> to identify attempts to exploit this vulnerability.</li>
<li>Monitor web server logs for suspicious XPath expressions, particularly those containing &ldquo;1=1&rdquo; or &ldquo;true()&rdquo;, using the <code>Web Server Log - XPath Boolean Expression</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xpath</category><category>denial-of-service</category><category>cve-2026-32287</category></item></channel></rss>