pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.5, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the /ASCIIHexDecode filter. This issue has been patched in version 6.7.5.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/648c627d2657447dfb1773412af05a0a5103b98f | Patch |
| https://github.com/py-pdf/pypdf/pull/3666 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.7.5 | Product Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-9m86-7pmv-2852 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 07:16
Updated : 2026-03-10 19:39
NVD link : CVE-2026-28804
Mitre link : CVE-2026-28804
CVE.ORG link : CVE-2026-28804
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-407
Inefficient Algorithmic Complexity
