CVE-2026-34172
HIGHGiskard Agents have Server-side template injection via ChatWorkflow.chat() using non-sandboxed Jinja2 Environment
Title source: cnaDescription
Giskard is an open-source Python library for testing and evaluating agentic systems. Prior to versions 0.3.4 and 1.0.2b1, ChatWorkflow.chat(message) passes its string argument directly as a Jinja2 template source to a non-sandboxed Environment. A developer who passes user input to this method enables full remote code execution via Jinja2 class traversal. The method name chat and parameter name message naturally invite passing user input directly, but the string is silently parsed as a Jinja2 template, not treated as plain text. This issue has been patched in versions 0.3.4 and 1.0.2b1.
Scores
CVSS v3
8.8
EPSS
0.0029
EPSS Percentile
52.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-1336
Status
published
Products (6)
giskard/giskard-agent
1.0.2 alpha1
giskard/giskard-agent
< 0.3.4
giskard/giskard-agents
1.0.1 alpha1
Giskard-AI/giskard-oss
< 0.3.4
Giskard-AI/giskard-oss
>= 1.0.1a1, < 1.0.2b1
pypi/giskard-agents
0 - 0.3.4PyPI
Published
Mar 31, 2026
Tracked Since
Mar 31, 2026