Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27628: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in py-pdf pypdf

0
Low
VulnerabilityCVE-2026-27628cvecve-2026-27628cwe-835
Published: Wed Feb 25 2026 (02/25/2026, 02:45:37 UTC)
Source: CVE Database V5
Vendor/Project: py-pdf
Product: pypdf

Description

CVE-2026-27628 is a low-severity vulnerability in the pypdf library versions prior to 6. 7. 2, where a specially crafted PDF can cause an infinite loop during file reading. This vulnerability arises from a loop with an unreachable exit condition (CWE-835). Exploitation requires no privileges but does require user interaction to open or process the malicious PDF. The impact is limited to potential denial of service by causing the application to hang. No known exploits are currently in the wild, and the issue has been fixed in pypdf version 6. 7. 2. Organizations using vulnerable versions should update promptly or apply manual patches.

AI-Powered Analysis

AILast updated: 02/25/2026, 03:27:34 UTC

Technical Analysis

CVE-2026-27628 identifies a vulnerability in the pypdf library, a widely used pure-Python PDF processing tool. The flaw is classified under CWE-835, indicating a loop with an unreachable exit condition, effectively causing an infinite loop when processing certain crafted PDF files. This infinite loop occurs during the reading phase of the PDF, which means that any application or service using pypdf versions earlier than 6.7.2 to parse or manipulate PDFs could be forced into a hang state by an attacker supplying a maliciously crafted PDF. The vulnerability does not require any privileges or authentication but does require user interaction to trigger, such as opening or processing the malicious PDF file. The CVSS 4.0 base score is 1.2, reflecting a low severity primarily due to the limited impact (denial of service via application hang) and the need for user interaction. No known exploits have been reported in the wild, and the issue was publicly disclosed and fixed in version 6.7.2 of pypdf. Mitigation involves upgrading to the patched version or applying the patch manually if upgrading is not immediately feasible.

Potential Impact

The primary impact of this vulnerability is a denial of service condition caused by an infinite loop, which can cause applications or services relying on pypdf to become unresponsive or consume excessive CPU resources. This can disrupt automated PDF processing workflows, web services that parse PDFs, or any software that integrates pypdf for PDF manipulation. While this does not lead to code execution or data leakage, the denial of service can affect availability and operational continuity, especially in environments processing large volumes of PDFs or handling untrusted documents. Organizations that rely on pypdf in critical systems may experience service degradation or outages if targeted. Since exploitation requires user interaction, the risk is mitigated somewhat by controlled document sources, but environments that accept PDFs from external or untrusted sources remain vulnerable.

Mitigation Recommendations

Organizations should upgrade all instances of pypdf to version 6.7.2 or later to fully remediate this vulnerability. If immediate upgrading is not possible, applying the official patch manually is recommended. Additionally, implement strict input validation and sandboxing when processing PDFs from untrusted sources to limit the impact of potential infinite loops. Monitoring CPU and memory usage of PDF processing services can help detect abnormal behavior indicative of exploitation attempts. Employing rate limiting and timeouts on PDF parsing operations can prevent prolonged resource consumption. Educate users and administrators about the risks of opening PDFs from untrusted sources, and consider using alternative PDF libraries with robust security track records in high-risk environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.027Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e6864b7ef31ef0bae9d21

Added to database: 2/25/2026, 3:11:32 AM

Last enriched: 2/25/2026, 3:27:34 AM

Last updated: 2/25/2026, 5:26:09 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats