๐Ÿ” CVE Alert

CVE-2026-28351

UNKNOWN 0.0

Manipulated RunLengthDecode streams can exhaust RAM

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664.

CWE CWE-400
Vendor py-pdf
Product pypdf
Published Feb 27, 2026
Last Updated Mar 3, 2026
Stay Ahead of the Next One

Get instant alerts for py-pdf pypdf

Be the first to know when new unknown vulnerabilities affecting py-pdf pypdf are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

py-pdf / pypdf
< 6.7.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/py-pdf/pypdf/security/advisories/GHSA-f2v5-7jq9-h8cg github.com: https://github.com/py-pdf/pypdf/pull/3664 github.com: https://github.com/py-pdf/pypdf/commit/f309c6003746414dc7b5048c19e6d879ff2dc858 github.com: https://github.com/py-pdf/pypdf/releases/tag/6.7.4