pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/f309c6003746414dc7b5048c19e6d879ff2dc858 | Patch |
| https://github.com/py-pdf/pypdf/pull/3664 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.7.4 | Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-f2v5-7jq9-h8cg | Patch Vendor Advisory |
Configurations
History
03 Mar 2026, 18:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pypdf Project
Pypdf Project pypdf |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| References | () https://github.com/py-pdf/pypdf/commit/f309c6003746414dc7b5048c19e6d879ff2dc858 - Patch | |
| References | () https://github.com/py-pdf/pypdf/pull/3664 - Issue Tracking, Patch | |
| References | () https://github.com/py-pdf/pypdf/releases/tag/6.7.4 - Release Notes | |
| References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-f2v5-7jq9-h8cg - Patch, Vendor Advisory |
27 Feb 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 21:16
Updated : 2026-03-03 18:36
NVD link : CVE-2026-28351
Mitre link : CVE-2026-28351
CVE.ORG link : CVE-2026-28351
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-400
Uncontrolled Resource Consumption
