ghsa-7hfw-26vp-jp8m
Vulnerability from github
Published
2025-08-13 19:51
Modified
2025-08-14 13:31
Severity ?
VLAI Severity ?
Summary
PyPDF's Manipulated FlateDecode streams can exhaust RAM
Details
Impact
An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access.
Patches
This has been fixed in pypdf==6.0.0.
Workarounds
If you cannot upgrade yet, you might want to implement the workaround for pypdf.filters.decompress
yourself: https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143
References
This issue has been reported in #3429 and fixed in #3430.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "pypdf" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "6.0.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-55197" ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2025-08-13T19:51:24Z", "nvd_published_at": "2025-08-13T23:15:27Z", "severity": "MODERATE" }, "details": "### Impact\nAn attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access.\n\n### Patches\nThis has been fixed in [pypdf==6.0.0](https://github.com/py-pdf/pypdf/releases/tag/6.0.0).\n\n### Workarounds\nIf you cannot upgrade yet, you might want to implement the workaround for `pypdf.filters.decompress` yourself: https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143\n\n### References\nThis issue has been reported in #3429 and fixed in #3430.", "id": "GHSA-7hfw-26vp-jp8m", "modified": "2025-08-14T13:31:08Z", "published": "2025-08-13T19:51:24Z", "references": [ { "type": "WEB", "url": "https://github.com/py-pdf/pypdf/security/advisories/GHSA-7hfw-26vp-jp8m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55197" }, { "type": "WEB", "url": "https://github.com/py-pdf/pypdf/issues/3429" }, { "type": "WEB", "url": "https://github.com/py-pdf/pypdf/pull/3430" }, { "type": "PACKAGE", "url": "https://github.com/py-pdf/pypdf" }, { "type": "WEB", "url": "https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143" }, { "type": "WEB", "url": "https://github.com/py-pdf/pypdf/releases/tag/6.0.0" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U", "type": "CVSS_V4" } ], "summary": "PyPDF\u0027s Manipulated FlateDecode streams can exhaust RAM" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…