CVE-2026-33123: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
CVE-2026-33123 is a medium severity vulnerability in the py-pdf pypdf library versions prior to 6. 9. 1. It allows an attacker to craft a malicious PDF that triggers uncontrolled resource consumption, causing long runtimes or excessive memory usage. Exploitation requires processing a specially crafted array-based stream with many entries, potentially leading to denial of service due to resource exhaustion. No authentication or user interaction is required, and the vulnerability affects systems that parse untrusted PDFs using vulnerable pypdf versions. The issue has been fixed in version 6. 9. 1. There are no known exploits in the wild currently.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-33123 affects the py-pdf pypdf library, a widely used pure-Python library for PDF manipulation. Versions prior to 6.9.1 contain a flaw categorized under CWE-400 (Uncontrolled Resource Consumption) and CWE-407 (Use of Uncontrolled Resource). The issue arises when the library processes an array-based stream within a PDF file that contains a large number of entries. An attacker can craft a malicious PDF exploiting this behavior to cause the library to consume excessive CPU time and memory resources during parsing. This can lead to denial of service conditions, such as application slowdowns or crashes due to resource exhaustion. The vulnerability does not require any privileges, authentication, or user interaction, making it easier to exploit in scenarios where untrusted PDFs are processed automatically or manually. The flaw was addressed and fixed in pypdf version 6.9.1 by improving resource handling and limiting the impact of large array streams. No public exploits or active exploitation campaigns have been reported to date. However, the vulnerability poses a risk to any system or service that uses vulnerable pypdf versions to parse or manipulate PDFs, especially in automated workflows or exposed document processing services.
Potential Impact
The primary impact of this vulnerability is denial of service through resource exhaustion. Organizations relying on pypdf for PDF processing—such as document management systems, web applications accepting PDF uploads, or automated PDF parsing services—may experience degraded performance, application crashes, or service outages if exposed to malicious PDFs exploiting this flaw. This can disrupt business operations, reduce availability of critical services, and potentially cause cascading failures in dependent systems. While the vulnerability does not directly lead to data breaches or code execution, the denial of service impact can be significant in environments processing large volumes of PDFs or exposed to untrusted inputs. The lack of required authentication or user interaction increases the risk, as attackers can trigger the issue remotely by submitting crafted PDFs. The medium CVSS score (5.1) reflects moderate impact and ease of exploitation, emphasizing the importance of timely patching to maintain service reliability and prevent operational disruptions.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all instances of the pypdf library to version 6.9.1 or later, where the issue is fixed. Additionally, implement strict input validation and sanitization to restrict or reject suspicious PDF files, especially those with unusually large or complex array streams. Employ resource limits and timeouts on PDF processing tasks to prevent excessive CPU or memory consumption from impacting overall system stability. Consider sandboxing PDF parsing operations to isolate potential failures and protect critical infrastructure. Monitor logs and system metrics for abnormal resource usage patterns that may indicate exploitation attempts. If upgrading is not immediately feasible, apply compensating controls such as restricting PDF uploads to trusted sources and scanning PDFs with alternative tools before processing. Regularly review and update PDF handling libraries and dependencies as part of a secure software maintenance lifecycle.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, India, Brazil
CVE-2026-33123: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
Description
CVE-2026-33123 is a medium severity vulnerability in the py-pdf pypdf library versions prior to 6. 9. 1. It allows an attacker to craft a malicious PDF that triggers uncontrolled resource consumption, causing long runtimes or excessive memory usage. Exploitation requires processing a specially crafted array-based stream with many entries, potentially leading to denial of service due to resource exhaustion. No authentication or user interaction is required, and the vulnerability affects systems that parse untrusted PDFs using vulnerable pypdf versions. The issue has been fixed in version 6. 9. 1. There are no known exploits in the wild currently.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-33123 affects the py-pdf pypdf library, a widely used pure-Python library for PDF manipulation. Versions prior to 6.9.1 contain a flaw categorized under CWE-400 (Uncontrolled Resource Consumption) and CWE-407 (Use of Uncontrolled Resource). The issue arises when the library processes an array-based stream within a PDF file that contains a large number of entries. An attacker can craft a malicious PDF exploiting this behavior to cause the library to consume excessive CPU time and memory resources during parsing. This can lead to denial of service conditions, such as application slowdowns or crashes due to resource exhaustion. The vulnerability does not require any privileges, authentication, or user interaction, making it easier to exploit in scenarios where untrusted PDFs are processed automatically or manually. The flaw was addressed and fixed in pypdf version 6.9.1 by improving resource handling and limiting the impact of large array streams. No public exploits or active exploitation campaigns have been reported to date. However, the vulnerability poses a risk to any system or service that uses vulnerable pypdf versions to parse or manipulate PDFs, especially in automated workflows or exposed document processing services.
Potential Impact
The primary impact of this vulnerability is denial of service through resource exhaustion. Organizations relying on pypdf for PDF processing—such as document management systems, web applications accepting PDF uploads, or automated PDF parsing services—may experience degraded performance, application crashes, or service outages if exposed to malicious PDFs exploiting this flaw. This can disrupt business operations, reduce availability of critical services, and potentially cause cascading failures in dependent systems. While the vulnerability does not directly lead to data breaches or code execution, the denial of service impact can be significant in environments processing large volumes of PDFs or exposed to untrusted inputs. The lack of required authentication or user interaction increases the risk, as attackers can trigger the issue remotely by submitting crafted PDFs. The medium CVSS score (5.1) reflects moderate impact and ease of exploitation, emphasizing the importance of timely patching to maintain service reliability and prevent operational disruptions.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all instances of the pypdf library to version 6.9.1 or later, where the issue is fixed. Additionally, implement strict input validation and sanitization to restrict or reject suspicious PDF files, especially those with unusually large or complex array streams. Employ resource limits and timeouts on PDF processing tasks to prevent excessive CPU or memory consumption from impacting overall system stability. Consider sandboxing PDF parsing operations to isolate potential failures and protect critical infrastructure. Monitor logs and system metrics for abnormal resource usage patterns that may indicate exploitation attempts. If upgrading is not immediately feasible, apply compensating controls such as restricting PDF uploads to trusted sources and scanning PDFs with alternative tools before processing. Regularly review and update PDF handling libraries and dependencies as part of a secure software maintenance lifecycle.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T20:35:49.926Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bd945ce32a4fbe5fbc7f83
Added to database: 3/20/2026, 6:39:24 PM
Last enriched: 3/27/2026, 7:42:26 PM
Last updated: 4/29/2026, 12:03:53 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.