pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to long runtimes. This requires loading a PDF with a large trailer `/Size` value in incremental mode. This has been fixed in pypdf 6.10.2. As a workaround, one may apply the changes from the patch manually.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/c50a0104cf083356f7c7f5d61410466a57f5c88a | Patch |
| https://github.com/py-pdf/pypdf/pull/3735 | Issue Tracking Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.10.2 | Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-4pxv-j86v-mhcw | Patch Vendor Advisory |
Configurations
History
27 Apr 2026, 19:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pypdf Project
Pypdf Project pypdf |
|
| CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| References | () https://github.com/py-pdf/pypdf/commit/c50a0104cf083356f7c7f5d61410466a57f5c88a - Patch | |
| References | () https://github.com/py-pdf/pypdf/pull/3735 - Issue Tracking, Patch | |
| References | () https://github.com/py-pdf/pypdf/releases/tag/6.10.2 - Release Notes | |
| References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-4pxv-j86v-mhcw - Patch, Vendor Advisory |
22 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 22:16
Updated : 2026-04-27 19:30
NVD link : CVE-2026-41313
Mitre link : CVE-2026-41313
CVE.ORG link : CVE-2026-41313
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-834
Excessive Iteration
