pypdf is a free and open-source pure-python PDF library. In versions prior to 6.10.0, manipulated XMP metadata entity declarations can exhaust RAM. An attacker who exploits this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata. This issue has been fixed in version 6.10.0.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/b15a374e5ca648d4878e57c3b2c0551e7f8cc7f8 | Patch |
| https://github.com/py-pdf/pypdf/pull/3724 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.10.0 | Product Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-3crg-w4f6-42mx | Mitigation Patch Vendor Advisory |
Configurations
History
22 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| First Time |
Pypdf Project
Pypdf Project pypdf |
|
| References | () https://github.com/py-pdf/pypdf/commit/b15a374e5ca648d4878e57c3b2c0551e7f8cc7f8 - Patch | |
| References | () https://github.com/py-pdf/pypdf/pull/3724 - Issue Tracking, Patch | |
| References | () https://github.com/py-pdf/pypdf/releases/tag/6.10.0 - Product, Release Notes | |
| References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-3crg-w4f6-42mx - Mitigation, Patch, Vendor Advisory |
17 Apr 2026, 01:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-17 01:17
Updated : 2026-04-22 20:16
NVD link : CVE-2026-40260
Mitre link : CVE-2026-40260
CVE.ORG link : CVE-2026-40260
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
