Medium severity5.5NVD Advisory· Published Apr 17, 2026· Updated Apr 24, 2026
CVE-2026-40319
CVE-2026-40319
Description
Giskard is an open-source testing framework for AI models. In versions prior to 1.0.2b1, the RegexMatching check passes a user-supplied regular expression pattern directly to Python's re.search() without any timeout or complexity guard. A crafted regex pattern can trigger catastrophic backtracking, causing the process to hang indefinitely. Exploitation requires write access to a check definition and subsequent execution of the test suite. This issue has been fixed in giskard-checks version 1.0.2b1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
giskard-checksPyPI | < 1.0.2b1 | 1.0.2b1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/Giskard-AI/giskard-oss/security/advisories/GHSA-rq2q-4r55-9877nvdVendor AdvisoryWEB
- github.com/advisories/GHSA-rq2q-4r55-9877ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40319ghsaADVISORY
- github.com/Giskard-AI/giskard-oss/releases/tag/giskard-checks%2Fv1.0.2b1nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.