CVE-2025-62708: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in py-pdf pypdf
pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.
AI Analysis
Technical Summary
CVE-2025-62708 is a vulnerability classified under CWE-409 (Improper Handling of Highly Compressed Data) affecting the py-pdf pypdf library, a pure Python PDF processing library widely used for reading and manipulating PDF files. The flaw exists in versions prior to 6.1.3 and arises when the library parses the content stream of a PDF page that uses the LZWDecode filter, a compression method for encoding data streams within PDFs. An attacker can craft a malicious PDF file with highly compressed data that, when processed by the vulnerable pypdf versions, triggers excessive memory consumption due to data amplification. This can lead to denial of service (DoS) conditions by exhausting system memory resources. The vulnerability is remotely exploitable without requiring any authentication or user interaction, as it only requires the vulnerable system to parse the crafted PDF. The CVSS 4.0 base score of 6.6 reflects a medium severity, considering the network attack vector, low attack complexity, no privileges or user interaction needed, and a high impact on availability. No known exploits have been reported in the wild as of the publication date (October 22, 2025). The issue was addressed and fixed in pypdf version 6.1.3 by improving the handling of LZWDecode streams to prevent excessive memory usage. Organizations that use pypdf for automated PDF processing, document management, or any service that parses untrusted PDFs are at risk if they run vulnerable versions.
Potential Impact
For European organizations, the primary impact is the risk of denial of service due to resource exhaustion when processing maliciously crafted PDFs. This can disrupt business operations, especially in sectors relying heavily on automated document workflows, such as legal, financial, healthcare, and government services. Memory exhaustion can lead to application crashes or system instability, potentially affecting availability of critical services. Since the vulnerability can be triggered remotely without authentication, exposed services that accept PDF uploads or parse PDFs from untrusted sources are particularly vulnerable. The impact on confidentiality and integrity is minimal, as the vulnerability does not enable code execution or data manipulation directly. However, service disruption can indirectly affect business continuity and user trust. Organizations using pypdf embedded in larger software stacks or cloud services should assess their exposure and update accordingly to maintain service reliability.
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of pypdf to version 6.1.3 or later, where the vulnerability is fixed. Organizations should audit their software dependencies to identify any use of vulnerable pypdf versions, including indirect dependencies in third-party applications. Implement strict input validation and sandboxing for PDF processing components to limit resource consumption and isolate failures. Employ resource usage monitoring and limits (e.g., memory and CPU quotas) on PDF parsing processes to prevent system-wide impact from malicious files. Where possible, restrict PDF uploads or processing to trusted sources or apply pre-processing filters to detect anomalous compression patterns. Maintain updated threat intelligence feeds to monitor for any emerging exploits targeting this vulnerability. Finally, integrate vulnerability scanning into the software development lifecycle to catch outdated library versions proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2025-62708: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in py-pdf pypdf
Description
pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-62708 is a vulnerability classified under CWE-409 (Improper Handling of Highly Compressed Data) affecting the py-pdf pypdf library, a pure Python PDF processing library widely used for reading and manipulating PDF files. The flaw exists in versions prior to 6.1.3 and arises when the library parses the content stream of a PDF page that uses the LZWDecode filter, a compression method for encoding data streams within PDFs. An attacker can craft a malicious PDF file with highly compressed data that, when processed by the vulnerable pypdf versions, triggers excessive memory consumption due to data amplification. This can lead to denial of service (DoS) conditions by exhausting system memory resources. The vulnerability is remotely exploitable without requiring any authentication or user interaction, as it only requires the vulnerable system to parse the crafted PDF. The CVSS 4.0 base score of 6.6 reflects a medium severity, considering the network attack vector, low attack complexity, no privileges or user interaction needed, and a high impact on availability. No known exploits have been reported in the wild as of the publication date (October 22, 2025). The issue was addressed and fixed in pypdf version 6.1.3 by improving the handling of LZWDecode streams to prevent excessive memory usage. Organizations that use pypdf for automated PDF processing, document management, or any service that parses untrusted PDFs are at risk if they run vulnerable versions.
Potential Impact
For European organizations, the primary impact is the risk of denial of service due to resource exhaustion when processing maliciously crafted PDFs. This can disrupt business operations, especially in sectors relying heavily on automated document workflows, such as legal, financial, healthcare, and government services. Memory exhaustion can lead to application crashes or system instability, potentially affecting availability of critical services. Since the vulnerability can be triggered remotely without authentication, exposed services that accept PDF uploads or parse PDFs from untrusted sources are particularly vulnerable. The impact on confidentiality and integrity is minimal, as the vulnerability does not enable code execution or data manipulation directly. However, service disruption can indirectly affect business continuity and user trust. Organizations using pypdf embedded in larger software stacks or cloud services should assess their exposure and update accordingly to maintain service reliability.
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of pypdf to version 6.1.3 or later, where the vulnerability is fixed. Organizations should audit their software dependencies to identify any use of vulnerable pypdf versions, including indirect dependencies in third-party applications. Implement strict input validation and sandboxing for PDF processing components to limit resource consumption and isolate failures. Employ resource usage monitoring and limits (e.g., memory and CPU quotas) on PDF parsing processes to prevent system-wide impact from malicious files. Where possible, restrict PDF uploads or processing to trusted sources or apply pre-processing filters to detect anomalous compression patterns. Maintain updated threat intelligence feeds to monitor for any emerging exploits targeting this vulnerability. Finally, integrate vulnerability scanning into the software development lifecycle to catch outdated library versions proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-20T19:41:22.739Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f95300066c59488c99ac1b
Added to database: 10/22/2025, 9:56:16 PM
Last enriched: 10/29/2025, 10:45:39 PM
Last updated: 12/7/2025, 2:04:23 PM
Views: 189
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14191: Buffer Overflow in UTT 进取 512W
HighCVE-2025-14190: SQL Injection in Chanjet TPlus
MediumCVE-2025-14189: SQL Injection in Chanjet CRM
MediumCVE-2025-14188: Command Injection in UGREEN DH2100+
HighCVE-2025-14187: Buffer Overflow in UGREEN DH2100+
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.