Description
A security flaw has been discovered in VectifyAI PageIndex up to f50e52975313c6716c02b20a119577a1929decba. Affected by this vulnerability is the function toc_transformer of the file pageindex/page_index.py of the component PDF Table of Contents Handler. The manipulation results in infinite loop. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
Published: 2026-05-11
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw resides in the toc_transformer function within PageIndex. An attacker can supply crafted input that causes an infinite loop during PDF Table of Contents handling, exhausting CPU resources and potentially crashing the service. This attack is a pure availability violation and is triggered by remote input. The CWEs referenced are 404 (Missing Resource) and 835 (Infinite Loop).

Affected Systems

VectifyAI:PageIndex is affected. No discrete version numbers are supplied because the project uses a rolling release model; the vulnerability exists in any code prior to the commit f50e52975313c6716c02b20a119577a1929decba.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. The exploit is publicly available, which increases risk; however, no EPSS score is reported, and the vulnerability is not in the CISA KEV catalog. The attack vector is inferred to be remote, as the description states that it may be launched remotely. An attacker would need network access to the component that processes PDFs to trigger the loop.

Generated by OpenCVE AI on May 11, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade VectifyAI PageIndex to a commit newer than f50e52975313c6716c02b20a119577a1929decba
  • If upgrading is not feasible, disable the toc_transformer module or block its usage from uncontrolled input
  • Continuously monitor the VectifyAI repository and security advisories for patches and apply them without delay

Generated by OpenCVE AI on May 11, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 18:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in VectifyAI PageIndex up to f50e52975313c6716c02b20a119577a1929decba. Affected by this vulnerability is the function toc_transformer of the file pageindex/page_index.py of the component PDF Table of Contents Handler. The manipulation results in infinite loop. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
Title VectifyAI PageIndex PDF Table of Contents page_index.py toc_transformer infinite loop
Weaknesses CWE-404
CWE-835
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T18:45:45.258Z

Reserved: 2026-05-11T13:16:41.121Z

Link: CVE-2026-8318

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T19:16:29.963

Modified: 2026-05-11T19:16:29.963

Link: CVE-2026-8318

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T19:30:06Z

Weaknesses