Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62708: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in py-pdf pypdf

0
Medium
VulnerabilityCVE-2025-62708cvecve-2025-62708cwe-409
Published: Wed Oct 22 2025 (10/22/2025, 21:36:56 UTC)
Source: CVE Database V5
Vendor/Project: py-pdf
Product: pypdf

Description

pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.

AI-Powered Analysis

AILast updated: 10/29/2025, 22:45:39 UTC

Technical Analysis

CVE-2025-62708 is a vulnerability classified under CWE-409 (Improper Handling of Highly Compressed Data) affecting the py-pdf pypdf library, a pure Python PDF processing library widely used for reading and manipulating PDF files. The flaw exists in versions prior to 6.1.3 and arises when the library parses the content stream of a PDF page that uses the LZWDecode filter, a compression method for encoding data streams within PDFs. An attacker can craft a malicious PDF file with highly compressed data that, when processed by the vulnerable pypdf versions, triggers excessive memory consumption due to data amplification. This can lead to denial of service (DoS) conditions by exhausting system memory resources. The vulnerability is remotely exploitable without requiring any authentication or user interaction, as it only requires the vulnerable system to parse the crafted PDF. The CVSS 4.0 base score of 6.6 reflects a medium severity, considering the network attack vector, low attack complexity, no privileges or user interaction needed, and a high impact on availability. No known exploits have been reported in the wild as of the publication date (October 22, 2025). The issue was addressed and fixed in pypdf version 6.1.3 by improving the handling of LZWDecode streams to prevent excessive memory usage. Organizations that use pypdf for automated PDF processing, document management, or any service that parses untrusted PDFs are at risk if they run vulnerable versions.

Potential Impact

For European organizations, the primary impact is the risk of denial of service due to resource exhaustion when processing maliciously crafted PDFs. This can disrupt business operations, especially in sectors relying heavily on automated document workflows, such as legal, financial, healthcare, and government services. Memory exhaustion can lead to application crashes or system instability, potentially affecting availability of critical services. Since the vulnerability can be triggered remotely without authentication, exposed services that accept PDF uploads or parse PDFs from untrusted sources are particularly vulnerable. The impact on confidentiality and integrity is minimal, as the vulnerability does not enable code execution or data manipulation directly. However, service disruption can indirectly affect business continuity and user trust. Organizations using pypdf embedded in larger software stacks or cloud services should assess their exposure and update accordingly to maintain service reliability.

Mitigation Recommendations

The most effective mitigation is to upgrade all instances of pypdf to version 6.1.3 or later, where the vulnerability is fixed. Organizations should audit their software dependencies to identify any use of vulnerable pypdf versions, including indirect dependencies in third-party applications. Implement strict input validation and sandboxing for PDF processing components to limit resource consumption and isolate failures. Employ resource usage monitoring and limits (e.g., memory and CPU quotas) on PDF parsing processes to prevent system-wide impact from malicious files. Where possible, restrict PDF uploads or processing to trusted sources or apply pre-processing filters to detect anomalous compression patterns. Maintain updated threat intelligence feeds to monitor for any emerging exploits targeting this vulnerability. Finally, integrate vulnerability scanning into the software development lifecycle to catch outdated library versions proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-20T19:41:22.739Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f95300066c59488c99ac1b

Added to database: 10/22/2025, 9:56:16 PM

Last enriched: 10/29/2025, 10:45:39 PM

Last updated: 12/7/2025, 2:04:23 PM

Views: 189

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats