pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corresponding stream being compressed using `/FlateDecode`. This has been fixed in pypdf 6.7.3. As a workaround, apply the patch manually.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/7a4c8246ed48d9d328fb596942271da47b6d109c | Patch |
| https://github.com/py-pdf/pypdf/pull/3658 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.7.3 | Product Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-x7hp-r3qg-r3cj | Patch Vendor Advisory |
Configurations
History
27 Feb 2026, 17:26
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/py-pdf/pypdf/commit/7a4c8246ed48d9d328fb596942271da47b6d109c - Patch | |
| References | () https://github.com/py-pdf/pypdf/pull/3658 - Issue Tracking, Patch | |
| References | () https://github.com/py-pdf/pypdf/releases/tag/6.7.3 - Product, Release Notes | |
| References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-x7hp-r3qg-r3cj - Patch, Vendor Advisory | |
| First Time |
Pypdf Project
Pypdf Project pypdf |
|
| CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* |
26 Feb 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 01:16
Updated : 2026-02-27 17:26
NVD link : CVE-2026-27888
Mitre link : CVE-2026-27888
CVE.ORG link : CVE-2026-27888
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-400
Uncontrolled Resource Consumption
