Examples/Vulnerable_XPathInjection_1.ps1

function Query-XmlUnsafe {
    param($username, $passwordHash)

    $query = "//users/user[username/text()='$username' and passwordHash/text()='$passwordHash']/data/text()"
    $navigator = New-Object psobject
    $navigator.Evaluate($query)
}