pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes and large memory consumption. This requires parsing the /ToUnicode entry of a font with unusually large values, for example during text extraction. This vulnerability is fixed in 6.7.1.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wgvp-vg3v-2xq3 | pypdf has possible long runtimes/large memory usage for large /ToUnicode streams |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 21 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1050 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 20 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes and large memory consumption. This requires parsing the /ToUnicode entry of a font with unusually large values, for example during text extraction. This vulnerability is fixed in 6.7.1. | |
| Title | pypdf has possible long runtimes/large memory usage for large /ToUnicode streams | |
| Weaknesses | CWE-834 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T21:11:20.441Z
Reserved: 2026-02-17T03:08:23.490Z
Link: CVE-2026-27025
No data.
Status : Received
Published: 2026-02-20T22:16:28.850
Modified: 2026-02-20T22:16:28.850
Link: CVE-2026-27025
OpenCVE Enrichment
No data.
Github GHSA