Description
pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to long runtimes. This requires loading a PDF with a large trailer `/Size` value in incremental mode. This has been fixed in pypdf 6.10.2. As a workaround, one may apply the changes from the patch manually.
Published: 2026-04-22
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via resource exhaustion
Action: Apply patch
AI Analysis

Impact

An attacker can craft a PDF document with an unusually large \/Size trailer entry and load it using pypdf in incremental mode. The library then performs an exhaustive routine that runs for an extended period, consuming CPU and memory resources. This can lead to a denial‑of‑service condition on the system that processes the PDF, but the vulnerability cannot be used for arbitrary code execution or data exfiltration.

Affected Systems

The flaw affects the open‑source pypdf library (py-pdf:pypdf). Versions prior to 6.10.2 are vulnerable; the fix was released with 6.10.2. Systems that import or use pypdf to process PDFs, particularly in or automated pipelines, are at risk.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate impact, and the EPSS score shows an exploitation probability of less than 1%. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires that an attacker supply a malicious PDF to a process that uses pypdf in incremental mode. Based on the description, it is inferred that the attack vector involves local input rather than remote exploitation. Systems parsing untrusted PDFs should treat this as a moderate risk, with exploitation possible if the library is invoked by an attacker-controlled workflow.

Generated by OpenCVE AI on April 28, 2026 at 07:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to pypdf 6.10.2 or later to receive the fix for the oversized \/Size handling bug
  • If upgrading is not immediately possible, apply the changes from the referenced commit or pull request manually to the pypdf source
  • Implement input validation for PDFs, rejecting files with an unusually large \/Size trailer before processing
  • Limit the execution time and resources allocated to PDF processing tasks to mitigate potential denial‑of‑service attacks

Generated by OpenCVE AI on April 28, 2026 at 07:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4pxv-j86v-mhcw pypdf: Possible long runtimes for wrong size values in incremental mode
History

Mon, 27 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Py-pdf
Py-pdf pypdf
Pypdf Project
Pypdf Project pypdf
CPEs cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:*
Vendors & Products Py-pdf
Py-pdf pypdf
Pypdf Project
Pypdf Project pypdf
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Sat, 25 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1284
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Thu, 23 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to long runtimes. This requires loading a PDF with a large trailer `/Size` value in incremental mode. This has been fixed in pypdf 6.10.2. As a workaround, one may apply the changes from the patch manually.
Title pypdf: Possible long runtimes for wrong size values in incremental mode
Weaknesses CWE-834
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T16:24:39.932Z

Reserved: 2026-04-20T14:01:46.671Z

Link: CVE-2026-41313

cve-icon Vulnrichment

Updated: 2026-04-23T13:44:16.218Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T22:16:32.220

Modified: 2026-04-27T19:30:37.560

Link: CVE-2026-41313

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T21:04:59Z

Links: CVE-2026-41313 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T08:00:14Z

Weaknesses