logo

CVE-2025-55197 pypdf

Package

Manager: pip
Name: pypdf
Vulnerable Version: >=0 <6.0.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

EPSS: 0.00057 pctl0.17904

Details

PyPDF's Manipulated FlateDecode streams can exhaust RAM ### Impact An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. ### Patches This has been fixed in [pypdf==6.0.0](https://github.com/py-pdf/pypdf/releases/tag/6.0.0). ### Workarounds If you cannot upgrade yet, you might want to implement the workaround for `pypdf.filters.decompress` yourself: https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143 ### References This issue has been reported in #3429 and fixed in #3430.

Metadata

Created: 2025-08-13T19:51:24Z
Modified: 2025-08-14T13:31:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-7hfw-26vp-jp8m/GHSA-7hfw-26vp-jp8m.json
CWE IDs: ["CWE-400", "CWE-770"]
Alternative ID: GHSA-7hfw-26vp-jp8m
Finding: F067
Auto approve: 1