High severity7.8NVD Advisory· Published Apr 17, 2026· Updated Apr 24, 2026
CVE-2026-40320
CVE-2026-40320
Description
Giskard is an open-source testing framework for AI models. In versions prior to 1.0.2b1, the ConformityCheck class rendered the rule parameter through Jinja2's default Template() constructor, silently interpreting template expressions at runtime. If check definitions are loaded from an untrusted source, a crafted rule string could achieve arbitrary code execution. Exploitation requires write access to a check definition and subsequent execution of the test suite. This issue has been fixed in giskard-checks version 1.0.2b1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
giskard-checksPyPI | < 1.0.2b1 | 1.0.2b1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/Giskard-AI/giskard-oss/security/advisories/GHSA-7xjm-g8f4-rp26nvdVendor AdvisoryWEB
- github.com/advisories/GHSA-7xjm-g8f4-rp26ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40320ghsaADVISORY
- github.com/Giskard-AI/giskard-oss/releases/tag/giskard-checks%2Fv1.0.2b1nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.