pypdf: Manipulated FlateDecode XFA streams can exhaust RAM
Description
Published by the National Vulnerability Database
Feb 26, 2026
Published to the GitHub Advisory Database
Feb 26, 2026
Reviewed
Feb 26, 2026
Last updated
Feb 26, 2026
Impact
An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the
xfaproperty of a reader or writer and the corresponding stream being compressed using/FlateDecode.Patches
This has been fixed in pypdf==6.7.3.
Workarounds
If projects cannot upgrade yet, consider applying the changes from PR #3658.
References