CVE-2026-27026
ADVISORY - githubSummary
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires a malformed /FlateDecode stream, where the byte-by-byte decompression is used.
Patches
This has been fixed in pypdf==6.7.1.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3644.
Common Weakness Enumeration (CWE)
ADVISORY - github
Allocation of Resources Without Limits or Throttling
GitHub
CREATED
UPDATED
ADVISORY IDGHSA-9mvc-8737-8j8h
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)