Bug 2450214 (CVE-2026-4645, GO-2026-4526)

Summary: CVE-2026-4645 github.com/antchfx/xpath: xpath: Denial of Service via crafted Boolean XPath expressions
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: adudiak, akoudelk, alcohan, gparvin, jbalunas, kshier, lbragsta, mwringe, pahickey, rhaigner, rjohnson, stcannon, teagle, wenshen, xiyuan, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2450291, 2450292, 2450293, 2450294, 2450295, 2450296, 2450297, 2450298, 2450299, 2450300, 2450301    
Bug Blocks:    

Description OSIDB Bzimport 2026-03-23 06:03:14 UTC
Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".