Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22690: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf

0
Low
VulnerabilityCVE-2026-22690cvecve-2026-22690cwe-400
Published: Sat Jan 10 2026 (01/10/2026, 04:41:20 UTC)
Source: CVE Database V5
Vendor/Project: py-pdf
Product: pypdf

Description

pypdf is a free and open-source pure-python PDF library. Prior to version 6.6.0, pypdf has possible long runtimes for missing /Root object with large /Size values. An attacker who uses this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be achieved by omitting the /Root entry in the trailer, while using a rather large /Size value. Only the non-strict reading mode is affected. This issue has been patched in version 6.6.0.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:53:57 UTC

Technical Analysis

CVE-2026-22690 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the pypdf library, a widely used pure-Python PDF processing tool. The issue arises in versions prior to 6.6.0 when the library processes PDF files in non-strict reading mode. Specifically, if a PDF file is crafted without the mandatory /Root object in its trailer dictionary but includes a large /Size value, pypdf attempts to process an excessive number of objects, leading to prolonged runtimes. This can cause significant CPU and memory consumption, effectively resulting in a denial-of-service (DoS) condition. The vulnerability does not require any privileges, user interaction, or authentication, and can be exploited remotely by supplying a malicious PDF to an application using the vulnerable pypdf version. The flaw is due to insufficient validation of the trailer dictionary and the /Size parameter, which controls the number of indirect objects the parser attempts to read. The issue has been addressed in pypdf version 6.6.0 by adding proper validation and limiting resource consumption during parsing. No known exploits have been reported in the wild to date, but the vulnerability poses a risk to any automated system that processes untrusted PDF files using vulnerable pypdf versions.

Potential Impact

For European organizations, the primary impact of this vulnerability is the risk of denial-of-service conditions in systems that rely on pypdf for PDF processing, such as document management systems, automated workflows, or web services that accept PDF uploads. Attackers can exploit this flaw to degrade service availability by sending specially crafted PDFs that cause excessive resource consumption. This can lead to increased CPU usage, memory exhaustion, and potential service outages, affecting business continuity and user experience. Confidentiality and integrity are not directly impacted, but availability degradation can disrupt critical document processing operations. Organizations handling large volumes of PDFs or providing PDF-related services are particularly at risk. Additionally, sectors with high reliance on automated document workflows, such as finance, legal, and government agencies, may face operational disruptions. While the CVSS score is low, the ease of exploitation and potential for service disruption warrant attention, especially in environments processing untrusted or external PDF files.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade all instances of pypdf to version 6.6.0 or later, where the issue is patched. Additionally, implement strict input validation and sanitization for all PDF files before processing, including rejecting PDFs missing mandatory structural elements like the /Root object. Employ resource usage monitoring and limits on PDF parsing operations to detect and prevent excessive CPU or memory consumption. Consider running PDF processing tasks in isolated environments or containers with resource constraints to limit the impact of potential abuse. For web-facing services, apply rate limiting and file size restrictions on PDF uploads to reduce attack surface. Regularly audit and update dependencies to ensure all libraries are current and vulnerabilities are addressed promptly. Finally, educate developers and system administrators about this vulnerability to ensure awareness and proactive defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-08T19:23:09.854Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6961dcab19784dcf52e61fb6

Added to database: 1/10/2026, 4:59:23 AM

Last enriched: 1/17/2026, 7:53:57 AM

Last updated: 2/7/2026, 3:20:08 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats