Impact
The vulnerability lies in the GitHub package antchfx/xpath, which is used by several Red Hat products. A remote attacker can submit specially crafted Boolean XPath expressions that evaluate to true, causing the logicalQuery.Select function to enter an infinite loop. This loop drives CPU usage to 100 % and results in a denial of service for the affected system.
Affected Systems
Any installation of the Red Hat Compliance Operator, File Integrity Operator, Migration Toolkit for Applications 8, Advanced Cluster Management for Kubernetes, Enterprise Linux 9 or 10, OpenShift Container Platform 4, or OpenShift distributed tracing that incorporates the antchfx/xpath library may be vulnerable. No specific version numbers are listed in the reference data, so the risk applies to all current releases of those products that depend on the impacted library.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, though the EPSS score is not available and the vulnerability is not yet listed in the CISA KEV catalog. The attack vector is inferred to be remote, via submission of crafted Boolean expressions to any service that processes XPath queries. If exploited, the effect is a system‑wide denial of service due to CPU exhaustion, potentially affecting availability of critical services.
OpenCVE Enrichment