GitHub CI Workaround: pip-audit Temporarily Ignores Low-Severity CVE-2026-4539 Due to Lack of Upstream Fix
A software project's continuous integration (CI) pipeline has been configured to bypass a specific security vulnerability check, highlighting a common but often overlooked tension between security compliance and practical development workflows. The project's maintainers have explicitly instructed the `pip-audit` tool to ignore CVE-2026-4539, a low-severity Regular Expression Denial of Service (ReDoS) flaw in the Pygments library. This directive is a temporary measure, documented with a TODO comment, because no official patch is yet available from the upstream maintainers of the affected dependency.
The vulnerability, rated LOW with a CVSS score of 3.3, resides in Pygments' `AdlLexer` component, which is used for parsing Archetype Definition Language—a niche medical modeling syntax. Crucially, the project does not use this specific lexer; it is a transitive dependency pulled in via other packages like `rich` and `pytest`. The exploit requires local access and can only affect system availability, posing no risk of data exposure. This context makes the actual attack surface for the project negligible, justifying the workaround as a risk-managed stopgap.
This incident underscores a recurring challenge in software supply chain security: teams must often choose between failing CI builds for unfixable, low-impact vulnerabilities or implementing strategic exceptions to maintain development velocity. The action signals that security tooling, while essential, can create operational friction when it flags issues without actionable remediation paths. The practice of adding a tracked TODO comment indicates responsible oversight, but it also places the onus on the team to monitor for and eventually apply the upstream fix when it becomes available, closing the security loop.