Description
Giskard is an open-source testing framework for AI models. In versions prior to 1.0.2b1, the RegexMatching check passes a user-supplied regular expression pattern directly to Python's re.search() without any timeout or complexity guard. A crafted regex pattern can trigger catastrophic backtracking, causing the process to hang indefinitely. Exploitation requires write access to a check definition and subsequent execution of the test suite. This issue has been fixed in giskard-checks version 1.0.2b1.
Published: 2026-04-17
Score: 1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The RegexMatching check in Giskard passes user‑supplied regular expression patterns directly to Python’s re.search without any timeout or complexity guard. A crafted pattern can trigger catastrophic backtracking, causing the process to hang indefinitely. This defect is a classic Regular Expression Denial of Service, identified as CWE‑1333. The impact is a denial of service; it does not expose data or allow code execution but can halt test execution entirely.

Affected Systems

All versions of the open‑source Giskard‑OSS framework prior to giskard‑checks 1.0.2b1 are affected. The flaw exists in the RegexMatching component of the Giskard-AI project and would affect any deployment that uses the vulnerable check definition files.

Risk and Exploitability

The CVSS score of 1.0 classifies the vulnerability as low severity. EPSS is not available and the issue is not listed in CISA KEV, indicating a relatively low likelihood of widespread exploitation. However, exploitation requires write access to a check definition file and subsequent execution of the test suite, so it is an internal threat that can stall continuous integration pipelines and delay model deployment.

Generated by OpenCVE AI on April 18, 2026 at 09:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to giskard‑checks version 1.0.2b1 or later.
  • If upgrading is not immediately possible, restrict write permissions to check definition files or disable the RegexMatching check for untrusted input.
  • Audit and sanitize any custom regular expression patterns used in the codebase to avoid patterns that could cause catastrophic backtracking.

Generated by OpenCVE AI on April 18, 2026 at 09:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rq2q-4r55-9877 Giskard has a Regular Expression Denial of Service (ReDoS) in RegexMatching Check
History

Fri, 24 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Giskard
Giskard giskard
CPEs cpe:2.3:a:giskard:giskard:*:*:*:*:*:*:*:*
Vendors & Products Giskard
Giskard giskard
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Mon, 20 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Giskard-ai
Giskard-ai giskard
Vendors & Products Giskard-ai
Giskard-ai giskard

Fri, 17 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Giskard is an open-source testing framework for AI models. In versions prior to 1.0.2b1, the RegexMatching check passes a user-supplied regular expression pattern directly to Python's re.search() without any timeout or complexity guard. A crafted regex pattern can trigger catastrophic backtracking, causing the process to hang indefinitely. Exploitation requires write access to a check definition and subsequent execution of the test suite. This issue has been fixed in giskard-checks version 1.0.2b1.
Title Giskard has a Regular Expression Denial of Service (ReDoS) in RegexMatching Check
Weaknesses CWE-1333
References
Metrics cvssV4_0

{'score': 1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L'}


Subscriptions

Giskard Giskard
Giskard-ai Giskard
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-20T13:46:09.167Z

Reserved: 2026-04-10T21:41:54.505Z

Link: CVE-2026-40319

cve-icon Vulnrichment

Updated: 2026-04-20T13:45:13.415Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-17T18:16:32.063

Modified: 2026-04-24T20:22:09.760

Link: CVE-2026-40319

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T09:15:15Z

Weaknesses