{"data":{"id":"e813942f-cc25-458a-8474-60bc1f968947","title":"GHSA-7xjm-g8f4-rp26: Giskard has Unsandboxed Jinja2 Template Rendering in ConformityCheck","summary":"The `ConformityCheck` class in giskard-checks was automatically treating the `rule` parameter as a Jinja2 template (a template language that evaluates expressions), which could allow arbitrary code execution if check definitions came from untrusted sources. While the library is only used locally by developers, this hidden behavior made it easy to accidentally pass untrusted input without realizing expressions would be evaluated.","solution":"Upgrade to `giskard-checks` >= 1.0.2b1. The patched version removes template rendering from rule evaluation entirely.","labels":["security"],"sourceUrl":"https://github.com/advisories/GHSA-7xjm-g8f4-rp26","publishedAt":"2026-04-14T23:13:52.000Z","cveId":"CVE-2026-40320","cweIds":null,"cvssScore":null,"cvssSeverity":"medium","severity":"medium","attackType":[],"issueType":"vulnerability","affectedPackages":["giskard-checks@<= 1.0.1b1 (fixed: 1.0.2b1)"],"affectedVendors":["HuggingFace"],"affectedVendorsRaw":["Giskard","giskard-checks"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0,"patchAvailable":true,"disclosureDate":"2026-04-14T23:13:52.000Z","capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["integrity","confidentiality"],"aiComponentTargeted":"framework","llmSpecific":false,"classifierConfidence":0.92,"researchCategory":null,"atlasIds":null}}