A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
https://github.com/golang/vulndb/issues/4526
https://github.com/antchfx/xpath/issues/121
https://github.com/antchfx/xpath/commit/afd4762cc342af56345a3fb4002a59281fcab494