Vulnerability Description
pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to the RAM being exhausted. This requires accessing a stream compressed using `/FlateDecode` with a `/Predictor` unequal 1 and large predictor parameters. This has been fixed in pypdf 6.10.2. As a workaround, one may apply the changes from the patch manually.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pypdf Project | Pypdf | < 6.10.2 |
Related Weaknesses (CWE)
References
- https://github.com/py-pdf/pypdf/commit/ac734dab4eef92bcce50d503949b4d9887d89f11Patch
- https://github.com/py-pdf/pypdf/pull/3734Issue TrackingPatch
- https://github.com/py-pdf/pypdf/releases/tag/6.10.2Release Notes
- https://github.com/py-pdf/pypdf/security/advisories/GHSA-7gw9-cf7v-778fPatchVendor Advisory
FAQ
What is CVE-2026-41312?
CVE-2026-41312 is a vulnerability with a CVSS score of 6.5 (MEDIUM). pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to the RAM being exhausted. This requires ...
How severe is CVE-2026-41312?
CVE-2026-41312 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41312?
Check the references section above for vendor advisories and patch information. Affected products include: Pypdf Project Pypdf.