CVE-2026-27888Uncontrolled Resource Consumption in Pypdf

Severity
6.6MEDIUMNVD
EPSS
0.1%
top 83.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 26

Description

pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corresponding stream being compressed using `/FlateDecode`. This has been fixed in pypdf 6.7.3. As a workaround, apply the patch manually.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages6 packages

CVEListV5py-pdf/pypdf< 6.7.3
debiandebian/pypdf< pypdf 6.9.0-1 (forky)
debiandebian/pypdf2< pypdf 6.9.0-1 (forky)
NVDpypdf_project/pypdf< 6.7.3
PyPIpypdf_project/pypdf< 6.7.3

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-27888: pypdf is a free and open-source pure-python PDF library2026-02-26
GHSA
pypdf: Manipulated FlateDecode XFA streams can exhaust RAM2026-02-26
OSV
pypdf: Manipulated FlateDecode XFA streams can exhaust RAM2026-02-26

📋Vendor Advisories

2
Red Hat
pypdf: pypdf: Denial of Service via crafted PDF2026-02-26
Debian
CVE-2026-27888: pypdf - pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an atta...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-27888 Impact, Exploitability, and Mitigation Steps | Wiz