Home

Description

pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corresponding stream being compressed using `/FlateDecode`. This has been fixed in pypdf 6.7.3. As a workaround, apply the patch manually.

PUBLISHED Reserved 2026-02-24 | Published 2026-02-26 | Updated 2026-02-26 | Assigner GitHub_M




MEDIUM: 6.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-400: Uncontrolled Resource Consumption

Product status

< 6.7.3
affected

References

github.com/.../pypdf/security/advisories/GHSA-x7hp-r3qg-r3cj

github.com/py-pdf/pypdf/pull/3658

github.com/...ommit/7a4c8246ed48d9d328fb596942271da47b6d109c

github.com/py-pdf/pypdf/releases/tag/6.7.3

cve.org (CVE-2026-27888)

nvd.nist.gov (CVE-2026-27888)

Download JSON