Injection Protection

Enterprise only

XPath extended injectionv3.9+

Detects intentionally malformed information that is sent to a website with the intention of constructing an XPath query for XML data, specifically in the full syntax. Uses the following regex for matching: /?(ancestor(-or-self)?|descendant(-or-self)?|following(-sibling))

Set up the plugin

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!