Giskard has a Regular Expression Denial of Service (ReDoS) in RegexMatching Check
Low severity
GitHub Reviewed
Published
Apr 13, 2026
in
Giskard-AI/giskard-oss
•
Updated Apr 27, 2026
Description
Published to the GitHub Advisory Database
Apr 14, 2026
Reviewed
Apr 14, 2026
Published by the National Vulnerability Database
Apr 17, 2026
Last updated
Apr 27, 2026
Summary
The RegexMatching check in the
giskard-checkspackage passes a user-supplied regular expression pattern directly to Python's re.search() without any timeout, complexity guard, or pattern validation. An attacker who can control the regex pattern or the text being matched can craft inputs that trigger catastrophic backtracking in the regex engine, causing the process to hang indefinitely and denying service to all other operations.giskard-checksis a local developer testing library. Check definitions, including the pattern parameter, are provided in application code or configuration files and executed locally. Exploitation requires write access to a check definition and subsequent execution of the test suite. The absence of a regex timeout could cause availability issues in automated environments such as CI/CD pipelines.Affected component
text_matching.py, line 457:re.search(pattern, text)Remediation
Upgrade to
giskard-checks>= 1.0.2b1.Credit
Giskard-AI thanks @dhabaleshwar for identifying the missing timeout on regex evaluation.
References