pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length inside the stream. This vulnerability is fixed in 6.8.0.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 10 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length inside the stream. This vulnerability is fixed in 6.8.0. | |
| Title | pypdf: manipulated stream length values can exhaust RAM | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-10T21:36:52.186Z
Updated: 2026-03-11T15:59:26.902Z
Reserved: 2026-03-09T17:41:56.077Z
Link: CVE-2026-31826
Updated: 2026-03-11T15:51:56.361Z
Status : Awaiting Analysis
Published: 2026-03-10T22:16:20.483
Modified: 2026-03-11T13:52:47.683
Link: CVE-2026-31826
ReportizFlow