CVE-2026-31826Allocation of Resources Without Limits or Throttling in Pypdf

Severity
6.8MEDIUMNVD
EPSS
0.0%
top 99.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 10
Latest updateMar 11

Description

pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length inside the stream. This vulnerability is fixed in 6.8.0.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages6 packages

CVEListV5py-pdf/pypdf< 6.8.0
debiandebian/pypdf< pypdf 6.9.0-1 (forky)
debiandebian/pypdf2< pypdf 6.9.0-1 (forky)
NVDpypdf_project/pypdf< 6.8.0
PyPIpypdf_project/pypdf< 6.8.0

Patches

🔴Vulnerability Details

3
OSV
pypdf: manipulated stream length values can exhaust RAM2026-03-11
GHSA
pypdf: manipulated stream length values can exhaust RAM2026-03-11
OSV
CVE-2026-31826: pypdf is a free and open-source pure-python PDF library2026-03-10

📋Vendor Advisories

2
Red Hat
pypdf: pypdf: Denial of Service due to excessive memory consumption via crafted PDF2026-03-10
Debian
CVE-2026-31826: pypdf - pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an atta...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-31826 Impact, Exploitability, and Mitigation Steps | Wiz