pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length inside the stream. This vulnerability is fixed in 6.8.0.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/pull/3675 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.8.0 | Product Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-hqmh-ppp3-xvm7 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-10 22:16
Updated : 2026-03-17 20:52
NVD link : CVE-2026-31826
Mitre link : CVE-2026-31826
CVE.ORG link : CVE-2026-31826
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
