pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corresponding stream being compressed using `/FlateDecode`. This has been fixed in pypdf 6.7.3. As a workaround, apply the patch manually.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/7a4c8246ed48d9d328fb596942271da47b6d109c | Patch |
| https://github.com/py-pdf/pypdf/pull/3658 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.7.3 | Product Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-x7hp-r3qg-r3cj | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-26 01:16
Updated : 2026-02-27 17:26
NVD link : CVE-2026-27888
Mitre link : CVE-2026-27888
CVE.ORG link : CVE-2026-27888
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-400
Uncontrolled Resource Consumption
