CVE-2025-55197

pypdf is a free and open-source pure-python PDF library. Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. This issue has been fixed in 6.0.0. If an update is not possible, a workaround involves including the fixed code from pypdf.filters.decompress into the existing filters file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:*

History

15 Aug 2025, 20:05

Type Values Removed Values Added
First Time Pypdf Project pypdf
Pypdf Project
CPE cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143 - () https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143 - Product
References () https://github.com/py-pdf/pypdf/issues/3429 - () https://github.com/py-pdf/pypdf/issues/3429 - Issue Tracking
References () https://github.com/py-pdf/pypdf/pull/3430 - () https://github.com/py-pdf/pypdf/pull/3430 - Patch
References () https://github.com/py-pdf/pypdf/releases/tag/6.0.0 - () https://github.com/py-pdf/pypdf/releases/tag/6.0.0 - Release Notes
References () https://github.com/py-pdf/pypdf/security/advisories/GHSA-7hfw-26vp-jp8m - () https://github.com/py-pdf/pypdf/security/advisories/GHSA-7hfw-26vp-jp8m - Third Party Advisory, Mitigation

14 Aug 2025, 13:11

Type Values Removed Values Added
Summary
  • (es) Pypdf es una librería PDF gratuita y de código abierto basada en Python. Antes de la versión 6.0.0, un atacante podía manipular un PDF que agotaba la RAM. Esto solo requería leer el archivo si se utilizaban una serie de filtros FlateDecode en un flujo de referencia cruzada malicioso. Otros flujos de contenido se ven afectados con el acceso explícito. Este problema se ha corregido en la versión 6.0.0. Si no es posible actualizar, una solución alternativa consiste en incluir el código corregido de pypdf.filters.decompress en el archivo de filtros existente.

13 Aug 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-13 23:15

Updated : 2025-08-15 20:05


NVD link : CVE-2025-55197

Mitre link : CVE-2025-55197

CVE.ORG link : CVE-2025-55197


JSON object : View

Products Affected

pypdf_project

  • pypdf
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling