pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires parsing the content stream of a page which has an inline image using the DCTDecode filter. This has been fixed in pypdf version 6.1.3.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/f2864d6dd9bac7cecd3f4f54308b25ebbfa178f8 | Patch |
| https://github.com/py-pdf/pypdf/pull/3501 | Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.1.3 | Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-vr63-x8vc-m265 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-22 22:15
Updated : 2025-10-27 20:25
NVD link : CVE-2025-62707
Mitre link : CVE-2025-62707
CVE.ORG link : CVE-2025-62707
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-834
Excessive Iteration
