📦 Pypdf

by Pypdf Project

🔍 What is Pypdf?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2026-27888

HIGH CVSS 7.5 Feb 26, 2026

This vulnerability in pypdf allows attackers to craft malicious PDF files that cause denial of service by exhausting system RAM when the XFA property is accessed and the corresponding stream uses Flat...

CVE-2025-62707

HIGH CVSS 7.5 Oct 22, 2025

CVE-2025-62707 is a denial-of-service vulnerability in pypdf, a popular Python PDF library. Attackers can craft malicious PDFs with inline images using DCTDecode filters that cause infinite loops duri...

CVE-2025-62708

HIGH CVSS 7.5 Oct 22, 2025

CVE-2025-62708 is a memory exhaustion vulnerability in pypdf, a popular Python PDF library. Attackers can craft malicious PDFs with LZWDecode filters that cause excessive memory consumption when parse...

CVE-2025-55197

HIGH CVSS 7.5 Aug 13, 2025

CVE-2025-55197 is a denial-of-service vulnerability in pypdf where specially crafted PDF files with malicious FlateDecode filters can cause RAM exhaustion. This affects all applications using pypdf ve...

CVE-2026-27025

MEDIUM CVSS 5.5 Feb 20, 2026

This vulnerability in pypdf allows attackers to craft malicious PDF files that cause excessive memory consumption and long processing times when parsing font /ToUnicode entries during text extraction....

CVE-2026-24688

MEDIUM CVSS 4.3 Jan 27, 2026

CVE-2026-24688 is an infinite loop vulnerability in pypdf, a Python PDF library. Attackers can craft malicious PDFs that cause denial of service when outlines/bookmarks are accessed. All projects usin...

CVE-2026-22691

MEDIUM CVSS 5.3 Jan 10, 2026

This vulnerability in pypdf allows attackers to craft malicious PDF files that cause excessive processing time when parsing malformed startxref entries. It affects systems using pypdf in non-strict re...

CVE-2026-22690

MEDIUM CVSS 5.3 Jan 10, 2026

This vulnerability in pypdf allows attackers to craft malicious PDF files that cause excessive processing time when parsed in non-strict mode. The attack works by omitting the /Root entry while using ...