Understanding XPath Injection VulnerabilitiesThe ability to trigger XPath queries with user-supplied information introduces the risk of XPath injection attacks. Read on to explore how these attacks work and discover how to keep your XPath queries secure.
Source:
Understanding XPath Injection Vulnerabilities