CVE-2026-40260
ADVISORY - githubSummary
Impact
An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata.
Patches
This has been fixed in pypdf==6.10.0.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3724.
Common Weakness Enumeration (CWE)
ADVISORY - github
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
GitHub
CREATED
UPDATED
ADVISORY IDGHSA-3crg-w4f6-42mx
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)