Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions | github.com/antchfx/xpath: xpath: Denial of Service via crafted Boolean XPath expressions |
| Metrics |
ssvc
|
Mon, 30 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 30 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system. | Duplicate of CVE-2026-32287 |
| CPEs | cpe:/a:redhat:migration_toolkit_applications:8 cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift_compliance_operator:1 cpe:/a:redhat:openshift_distributed_tracing:3 cpe:/a:redhat:openshift_file_integrity_operator:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat acm
Redhat migration Toolkit Applications Redhat openshift |
Tue, 24 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat advanced Cluster Management For Kubernetes
Redhat migration Toolkit For Applications Redhat openshift Container Platform |
|
| Vendors & Products |
Redhat advanced Cluster Management For Kubernetes
Redhat migration Toolkit For Applications Redhat openshift Container Platform |
Tue, 24 Mar 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 23 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system. | |
| Title | Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions | |
| First Time appeared |
Redhat
Redhat acm Redhat enterprise Linux Redhat migration Toolkit Applications Redhat openshift Redhat openshift Compliance Operator Redhat openshift Distributed Tracing Redhat openshift File Integrity Operator |
|
| Weaknesses | CWE-835 | |
| CPEs | cpe:/a:redhat:acm:2 cpe:/a:redhat:migration_toolkit_applications:8 cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift_compliance_operator:1 cpe:/a:redhat:openshift_distributed_tracing:3 cpe:/a:redhat:openshift_file_integrity_operator:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat acm Redhat enterprise Linux Redhat migration Toolkit Applications Redhat openshift Redhat openshift Compliance Operator Redhat openshift Distributed Tracing Redhat openshift File Integrity Operator |
|
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
Status: REJECTED
Assigner: redhat
Published:
Updated: 2026-03-30T08:01:39.710Z
Reserved: 2026-03-23T12:21:39.096Z
Link: CVE-2026-4645
Updated:
Status : Rejected
Published: 2026-03-23T14:16:36.063
Modified: 2026-03-30T08:16:18.693
Link: CVE-2026-4645
OpenCVE Enrichment
Updated: 2026-03-25T14:49:04Z