-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from an inefficient regex (CWE-1333) shown in the diff for transformation.py. The critical change was replacing a '+' quantifier with a single character match in the regex pattern, which directly addresses catastrophic backtracking. The regex is used in text perturbation detection during punctuation removal, and the added test case with excessive exclamation marks demonstrates the attack vector. Though no explicit function name is provided, the 'gruber' regex compilation and its usage context in text processing make it the primary vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| giskard | pip | <= 2.15.4 | 2.15.5 |
KEV Misses 88% of Exploited CVEs- Get the report