CVE-2026-22690: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
pypdf is a free and open-source pure-python PDF library. Prior to version 6.6.0, pypdf has possible long runtimes for missing /Root object with large /Size values. An attacker who uses this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be achieved by omitting the /Root entry in the trailer, while using a rather large /Size value. Only the non-strict reading mode is affected. This issue has been patched in version 6.6.0.
AI Analysis
Technical Summary
CVE-2026-22690 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the pypdf library, a widely used pure-Python PDF processing tool. The issue arises in versions prior to 6.6.0 when the library processes PDF files in non-strict reading mode. Specifically, if a PDF file is crafted without the mandatory /Root object in its trailer dictionary but includes a large /Size value, pypdf attempts to process an excessive number of objects, leading to prolonged runtimes. This can cause significant CPU and memory consumption, effectively resulting in a denial-of-service (DoS) condition. The vulnerability does not require any privileges, user interaction, or authentication, and can be exploited remotely by supplying a malicious PDF to an application using the vulnerable pypdf version. The flaw is due to insufficient validation of the trailer dictionary and the /Size parameter, which controls the number of indirect objects the parser attempts to read. The issue has been addressed in pypdf version 6.6.0 by adding proper validation and limiting resource consumption during parsing. No known exploits have been reported in the wild to date, but the vulnerability poses a risk to any automated system that processes untrusted PDF files using vulnerable pypdf versions.
Potential Impact
For European organizations, the primary impact of this vulnerability is the risk of denial-of-service conditions in systems that rely on pypdf for PDF processing, such as document management systems, automated workflows, or web services that accept PDF uploads. Attackers can exploit this flaw to degrade service availability by sending specially crafted PDFs that cause excessive resource consumption. This can lead to increased CPU usage, memory exhaustion, and potential service outages, affecting business continuity and user experience. Confidentiality and integrity are not directly impacted, but availability degradation can disrupt critical document processing operations. Organizations handling large volumes of PDFs or providing PDF-related services are particularly at risk. Additionally, sectors with high reliance on automated document workflows, such as finance, legal, and government agencies, may face operational disruptions. While the CVSS score is low, the ease of exploitation and potential for service disruption warrant attention, especially in environments processing untrusted or external PDF files.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade all instances of pypdf to version 6.6.0 or later, where the issue is patched. Additionally, implement strict input validation and sanitization for all PDF files before processing, including rejecting PDFs missing mandatory structural elements like the /Root object. Employ resource usage monitoring and limits on PDF parsing operations to detect and prevent excessive CPU or memory consumption. Consider running PDF processing tasks in isolated environments or containers with resource constraints to limit the impact of potential abuse. For web-facing services, apply rate limiting and file size restrictions on PDF uploads to reduce attack surface. Regularly audit and update dependencies to ensure all libraries are current and vulnerabilities are addressed promptly. Finally, educate developers and system administrators about this vulnerability to ensure awareness and proactive defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2026-22690: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
Description
pypdf is a free and open-source pure-python PDF library. Prior to version 6.6.0, pypdf has possible long runtimes for missing /Root object with large /Size values. An attacker who uses this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be achieved by omitting the /Root entry in the trailer, while using a rather large /Size value. Only the non-strict reading mode is affected. This issue has been patched in version 6.6.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-22690 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the pypdf library, a widely used pure-Python PDF processing tool. The issue arises in versions prior to 6.6.0 when the library processes PDF files in non-strict reading mode. Specifically, if a PDF file is crafted without the mandatory /Root object in its trailer dictionary but includes a large /Size value, pypdf attempts to process an excessive number of objects, leading to prolonged runtimes. This can cause significant CPU and memory consumption, effectively resulting in a denial-of-service (DoS) condition. The vulnerability does not require any privileges, user interaction, or authentication, and can be exploited remotely by supplying a malicious PDF to an application using the vulnerable pypdf version. The flaw is due to insufficient validation of the trailer dictionary and the /Size parameter, which controls the number of indirect objects the parser attempts to read. The issue has been addressed in pypdf version 6.6.0 by adding proper validation and limiting resource consumption during parsing. No known exploits have been reported in the wild to date, but the vulnerability poses a risk to any automated system that processes untrusted PDF files using vulnerable pypdf versions.
Potential Impact
For European organizations, the primary impact of this vulnerability is the risk of denial-of-service conditions in systems that rely on pypdf for PDF processing, such as document management systems, automated workflows, or web services that accept PDF uploads. Attackers can exploit this flaw to degrade service availability by sending specially crafted PDFs that cause excessive resource consumption. This can lead to increased CPU usage, memory exhaustion, and potential service outages, affecting business continuity and user experience. Confidentiality and integrity are not directly impacted, but availability degradation can disrupt critical document processing operations. Organizations handling large volumes of PDFs or providing PDF-related services are particularly at risk. Additionally, sectors with high reliance on automated document workflows, such as finance, legal, and government agencies, may face operational disruptions. While the CVSS score is low, the ease of exploitation and potential for service disruption warrant attention, especially in environments processing untrusted or external PDF files.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade all instances of pypdf to version 6.6.0 or later, where the issue is patched. Additionally, implement strict input validation and sanitization for all PDF files before processing, including rejecting PDFs missing mandatory structural elements like the /Root object. Employ resource usage monitoring and limits on PDF parsing operations to detect and prevent excessive CPU or memory consumption. Consider running PDF processing tasks in isolated environments or containers with resource constraints to limit the impact of potential abuse. For web-facing services, apply rate limiting and file size restrictions on PDF uploads to reduce attack surface. Regularly audit and update dependencies to ensure all libraries are current and vulnerabilities are addressed promptly. Finally, educate developers and system administrators about this vulnerability to ensure awareness and proactive defense.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-08T19:23:09.854Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6961dcab19784dcf52e61fb6
Added to database: 1/10/2026, 4:59:23 AM
Last enriched: 1/17/2026, 7:53:57 AM
Last updated: 2/7/2026, 3:20:08 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.