Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66019: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf

0
Medium
VulnerabilityCVE-2025-66019cvecve-2025-66019cwe-400cwe-409
Published: Tue Nov 25 2025 (11/25/2025, 23:38:12 UTC)
Source: CVE Database V5
Vendor/Project: py-pdf
Product: pypdf

Description

pypdf is a free and open-source pure-python PDF library. Prior to version 6.4.0, an attacker who uses this vulnerability can craft a PDF which leads to a memory usage of up to 1 GB per stream. This requires parsing the content stream of a page using the LZWDecode filter. This issue has been patched in version 6.4.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:09:50 UTC

Technical Analysis

CVE-2025-66019 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-409, affecting the pypdf library, a widely used pure-Python PDF processing tool. The flaw exists in versions prior to 6.4.0 and is triggered when parsing PDF content streams that use the LZWDecode filter. An attacker can craft a malicious PDF file that causes the parser to consume excessive memory—up to approximately 1 GB per stream—leading to potential denial of service (DoS) by exhausting system resources. The vulnerability does not require any privileges, authentication, or user interaction, making it remotely exploitable simply by processing a malicious PDF. The excessive memory usage stems from inadequate handling and validation of the LZWDecode filter data during parsing, causing the parser to allocate large amounts of memory unnecessarily. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to applications that automatically process or render untrusted PDFs using vulnerable pypdf versions. The issue has been addressed in pypdf version 6.4.0, which includes fixes to properly limit resource consumption during LZWDecode stream parsing. The CVSS v4.0 base score is 6.6, reflecting a medium severity level due to the potential for DoS without requiring privileges or user interaction.

Potential Impact

For European organizations, the primary impact of CVE-2025-66019 is the risk of denial of service through resource exhaustion when processing malicious PDFs. This can disrupt business operations, especially for sectors relying heavily on automated document processing, such as finance, legal, healthcare, and government services. Memory exhaustion can lead to application crashes, degraded performance, or system instability, potentially causing downtime and loss of productivity. Organizations that integrate pypdf into web services, document management systems, or automated workflows that handle untrusted PDFs are particularly vulnerable. Additionally, if exploited in a multi-tenant environment or cloud service, this vulnerability could affect multiple customers or services simultaneously. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be significant. The absence of known exploits reduces immediate risk, but the ease of exploitation and lack of required authentication make timely patching critical.

Mitigation Recommendations

1. Upgrade all instances of pypdf to version 6.4.0 or later immediately to incorporate the patch addressing this vulnerability. 2. Implement strict input validation and sandboxing for PDF processing components to isolate and limit resource usage. 3. Enforce memory and CPU usage limits on processes handling PDF parsing, using containerization or operating system-level controls. 4. Monitor application logs and system metrics for unusual memory spikes or crashes related to PDF processing. 5. Where feasible, restrict or sanitize PDFs from untrusted sources before processing. 6. Conduct regular security assessments and code reviews of custom integrations using pypdf to ensure no vulnerable versions are in use. 7. Educate developers and system administrators about the risks of processing untrusted PDFs and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-21T01:08:02.613Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69263fd05765e822eef9c745

Added to database: 11/25/2025, 11:46:24 PM

Last enriched: 1/20/2026, 7:09:50 PM

Last updated: 2/7/2026, 5:03:12 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats