CVE-2026-28351Uncontrolled Resource Consumption in Pypdf

Severity
6.9MEDIUMNVD
EPSS
0.0%
top 95.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateFeb 28

Description

pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages6 packages

CVEListV5py-pdf/pypdf< 6.7.4
debiandebian/pypdf< pypdf 6.9.0-1 (forky)
debiandebian/pypdf2< pypdf 6.9.0-1 (forky)
NVDpypdf_project/pypdf< 6.7.4
PyPIpypdf_project/pypdf< 6.7.4

Patches

🔴Vulnerability Details

3
GHSA
pypdf: Manipulated RunLengthDecode streams can exhaust RAM2026-02-28
OSV
pypdf: Manipulated RunLengthDecode streams can exhaust RAM2026-02-28
OSV
CVE-2026-28351: pypdf is a free and open-source pure-python PDF library2026-02-27

📋Vendor Advisories

2
Red Hat
pypdf: pypdf: Denial of Service via crafted PDF with RunLengthDecode filter2026-02-27
Debian
CVE-2026-28351: pypdf - pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4,...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-28351 Impact, Exploitability, and Mitigation Steps | Wiz