Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22691: CWE-1333: Inefficient Regular Expression Complexity in py-pdf pypdf

0
Low
VulnerabilityCVE-2026-22691cvecve-2026-22691cwe-1333cwe-400
Published: Sat Jan 10 2026 (01/10/2026, 04:46:12 UTC)
Source: CVE Database V5
Vendor/Project: py-pdf
Product: pypdf

Description

pypdf is a free and open-source pure-python PDF library. Prior to version 6.6.0, pypdf has possible long runtimes for malformed startxref. An attacker who uses this vulnerability can craft a PDF which leads to possibly long runtimes for invalid startxref entries. When rebuilding the cross-reference table, PDF files with lots of whitespace characters become problematic. Only the non-strict reading mode is affected. Only the non-strict reading mode is affected. This issue has been patched in version 6.6.0.

AI-Powered Analysis

AILast updated: 01/10/2026, 05:13:41 UTC

Technical Analysis

CVE-2026-22691 is a vulnerability identified in the py-pdf pypdf library, a pure-Python PDF processing library widely used for reading and manipulating PDF files. The flaw arises from inefficient handling of malformed startxref entries during the rebuilding of the cross-reference table in PDF files. Specifically, when operating in non-strict reading mode, the library's regular expressions used to parse the startxref section can exhibit excessive complexity when encountering PDFs with large amounts of whitespace characters. This inefficiency can cause the parsing process to consume excessive CPU resources, leading to significantly prolonged runtimes or potential denial of service conditions. The vulnerability is classified under CWE-1333 (Inefficient Regular Expression Complexity) and CWE-400 (Uncontrolled Resource Consumption). Exploitation requires no authentication or user interaction and can be triggered remotely by supplying a crafted PDF file to an application using a vulnerable pypdf version below 6.6.0. The issue has been addressed in pypdf version 6.6.0 by optimizing the parsing logic and mitigating the regex complexity. No known exploits have been reported in the wild as of the publication date. The CVSS v4.0 base score is 2.7, reflecting a low severity primarily due to the limited impact scope and lack of confidentiality, integrity, or availability compromise beyond resource exhaustion.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential for denial of service or significant performance degradation in systems that rely on pypdf for automated PDF processing, such as document management platforms, content ingestion pipelines, or PDF validation tools. Attackers could supply maliciously crafted PDFs to disrupt services, causing downtime or delayed processing. While the vulnerability does not lead to data leakage or code execution, the resource exhaustion could affect availability and operational continuity. Organizations handling large volumes of PDFs or exposed to untrusted PDF inputs are at higher risk. The impact is more pronounced in environments where non-strict parsing mode is enabled, which may be used to tolerate malformed PDFs but increases vulnerability exposure. Given the low CVSS score and absence of known exploits, the immediate risk is limited but should not be ignored in critical document processing workflows.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should upgrade all instances of pypdf to version 6.6.0 or later, where the issue has been patched. If upgrading is not immediately feasible, disabling or avoiding the use of non-strict reading mode in PDF parsing can reduce exposure. Implement input validation and filtering to detect and block suspicious PDFs with excessive whitespace or malformed startxref sections before processing. Employ resource usage monitoring and timeouts on PDF parsing operations to prevent prolonged runtimes from impacting system availability. Additionally, consider sandboxing PDF processing components to isolate potential denial of service effects. Regularly review and update dependencies to incorporate security patches promptly. Finally, educate developers and system administrators about this vulnerability to ensure awareness and timely remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-08T19:23:09.855Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6961dcab19784dcf52e61fbc

Added to database: 1/10/2026, 4:59:23 AM

Last enriched: 1/10/2026, 5:13:41 AM

Last updated: 1/10/2026, 9:32:06 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats