XPath extended injectionv3.9+

Detects intentionally malformed information that is sent to a website with the intention of constructing an XPath query for XML data, specifically in the full syntax. Uses the following regex for matching: /?(ancestor(-or-self)?|descendant(-or-self)?|following(-sibling))

Set up the plugin

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!