Home / Vulnerability Database / PHP : XPath injection
PHP
PHP : XPath injection
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
Overview
The application executes XPath query built on the basis of data from an untrusted source. An attacker can change the meaning of the executed expression or execute arbitrary query.
A possible attack scenario:
- The application receives input data from an untrusted source.
- This data is used to dynamically create XPath query.
- An attacker get an opportunity to influence the semantics of the query or execute his/her own queries.
MEDIUM
DerScanner Severity Score
Do you want to fix PHP : XPath injection in your application?
See also
PHP
PHP : Null salt
PHP
PHP : Empty password
PHP
