CVE-2026-34172 in Giskard-AI giskard-oss
要約 (英語)
Giskard is an open-source Python library for testing and evaluating agentic systems. Prior to versions 0.3.4 and 1.0.2b1, ChatWorkflow.chat(message) passes its string argument directly as a Jinja2 template source to a non-sandboxed Environment. A developer who passes user input to this method enables full remote code execution via Jinja2 class traversal. The method name chat and parameter name message naturally invite passing user input directly, but the string is silently parsed as a Jinja2 template, not treated as plain text. This issue has been patched in versions 0.3.4 and 1.0.2b1.
責任者
GitHub_M
予約する
2026年03月25日
公開
2026年03月31日
エントリ
VulDB provides additional information and datapoints for this CVE:
| 識別子 | 脆弱性 | CWE | 悪用可 | 対策 | CVE |
|---|---|---|---|---|---|
| 354391 | Giskard-AI giskard-oss Name Message ChatWorkflow.chat 特権昇格 | 1336 | 未定義 | 公式な修正 | CVE-2026-34172 |