Metrics
Affected Vendors & Products
Fri, 15 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pypdf Project
Pypdf Project pypdf |
|
CPEs | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
Vendors & Products |
Pypdf Project
Pypdf Project pypdf |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 14 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 14 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 13 Aug 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | pypdf is a free and open-source pure-python PDF library. Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. This issue has been fixed in 6.0.0. If an update is not possible, a workaround involves including the fixed code from pypdf.filters.decompress into the existing filters file. | |
Title | pypdf's Manipulated FlateDecode streams can exhaust RAM | |
Weaknesses | CWE-400 CWE-770 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-13T23:03:02.018Z
Updated: 2025-08-14T14:50:48.663Z
Reserved: 2025-08-08T21:55:07.964Z
Link: CVE-2025-55197

Updated: 2025-08-14T13:41:30.430Z

Status : Analyzed
Published: 2025-08-13T23:15:27.660
Modified: 2025-08-15T20:05:20.427
Link: CVE-2025-55197
