pypdf can exhaust RAM via manipulated LZWDecode streams
Description
Published to the GitHub Advisory Database
Oct 22, 2025
Reviewed
Oct 22, 2025
Published by the National Vulnerability Database
Oct 22, 2025
Last updated
Oct 23, 2025
Impact
An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter.
Patches
This has been fixed in pypdf==6.1.3.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3502.
References