pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.1 can craft a PDF which leads to long runtimes. This requires cross-reference streams with wrong large `/Size` values or object streams with wrong large `/N` values. This has been fixed in pypdf 6.10.1. As a workaround, one may apply the changes from the patch manually.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/62338e9d36419cf193ccec7331784f45df1d70b3 | Patch |
| https://github.com/py-pdf/pypdf/pull/3733 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.10.1 | Product Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-jj6c-8h6c-hppx | Mitigation Patch Vendor Advisory |
Configurations
History
24 Apr 2026, 13:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/py-pdf/pypdf/commit/62338e9d36419cf193ccec7331784f45df1d70b3 - Patch | |
| References | () https://github.com/py-pdf/pypdf/pull/3733 - Issue Tracking, Patch | |
| References | () https://github.com/py-pdf/pypdf/releases/tag/6.10.1 - Product, Release Notes | |
| References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-jj6c-8h6c-hppx - Mitigation, Patch, Vendor Advisory | |
| First Time |
Pypdf Project
Pypdf Project pypdf |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* |
22 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 21:17
Updated : 2026-04-24 13:07
NVD link : CVE-2026-41168
Mitre link : CVE-2026-41168
CVE.ORG link : CVE-2026-41168
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-834
Excessive Iteration
