pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/e51d07807ffcdaf18077b9486dadb3dc05b368da | Patch |
| https://github.com/py-pdf/pypdf/pull/3502 | Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.1.3 | Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-jfx9-29x2-rv3j | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-10-22 22:15
Updated : 2025-10-27 20:24
NVD link : CVE-2025-62708
Mitre link : CVE-2025-62708
CVE.ORG link : CVE-2025-62708
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-409
Improper Handling of Highly Compressed Data (Data Amplification)
