Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33123: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf

0
Medium
VulnerabilityCVE-2026-33123cvecve-2026-33123cwe-400cwe-407
Published: Fri Mar 20 2026 (03/20/2026, 09:09:12 UTC)
Source: CVE Database V5
Vendor/Project: py-pdf
Product: pypdf

Description

CVE-2026-33123 is a medium severity vulnerability in the py-pdf pypdf library versions prior to 6. 9. 1. It allows an attacker to craft a malicious PDF that triggers uncontrolled resource consumption, causing long runtimes or excessive memory usage. Exploitation requires processing a specially crafted array-based stream with many entries, potentially leading to denial of service due to resource exhaustion. No authentication or user interaction is required, and the vulnerability affects systems that parse untrusted PDFs using vulnerable pypdf versions. The issue has been fixed in version 6. 9. 1. There are no known exploits in the wild currently.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:42:26 UTC

Technical Analysis

The vulnerability identified as CVE-2026-33123 affects the py-pdf pypdf library, a widely used pure-Python library for PDF manipulation. Versions prior to 6.9.1 contain a flaw categorized under CWE-400 (Uncontrolled Resource Consumption) and CWE-407 (Use of Uncontrolled Resource). The issue arises when the library processes an array-based stream within a PDF file that contains a large number of entries. An attacker can craft a malicious PDF exploiting this behavior to cause the library to consume excessive CPU time and memory resources during parsing. This can lead to denial of service conditions, such as application slowdowns or crashes due to resource exhaustion. The vulnerability does not require any privileges, authentication, or user interaction, making it easier to exploit in scenarios where untrusted PDFs are processed automatically or manually. The flaw was addressed and fixed in pypdf version 6.9.1 by improving resource handling and limiting the impact of large array streams. No public exploits or active exploitation campaigns have been reported to date. However, the vulnerability poses a risk to any system or service that uses vulnerable pypdf versions to parse or manipulate PDFs, especially in automated workflows or exposed document processing services.

Potential Impact

The primary impact of this vulnerability is denial of service through resource exhaustion. Organizations relying on pypdf for PDF processing—such as document management systems, web applications accepting PDF uploads, or automated PDF parsing services—may experience degraded performance, application crashes, or service outages if exposed to malicious PDFs exploiting this flaw. This can disrupt business operations, reduce availability of critical services, and potentially cause cascading failures in dependent systems. While the vulnerability does not directly lead to data breaches or code execution, the denial of service impact can be significant in environments processing large volumes of PDFs or exposed to untrusted inputs. The lack of required authentication or user interaction increases the risk, as attackers can trigger the issue remotely by submitting crafted PDFs. The medium CVSS score (5.1) reflects moderate impact and ease of exploitation, emphasizing the importance of timely patching to maintain service reliability and prevent operational disruptions.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade all instances of the pypdf library to version 6.9.1 or later, where the issue is fixed. Additionally, implement strict input validation and sanitization to restrict or reject suspicious PDF files, especially those with unusually large or complex array streams. Employ resource limits and timeouts on PDF processing tasks to prevent excessive CPU or memory consumption from impacting overall system stability. Consider sandboxing PDF parsing operations to isolate potential failures and protect critical infrastructure. Monitor logs and system metrics for abnormal resource usage patterns that may indicate exploitation attempts. If upgrading is not immediately feasible, apply compensating controls such as restricting PDF uploads to trusted sources and scanning PDFs with alternative tools before processing. Regularly review and update PDF handling libraries and dependencies as part of a secure software maintenance lifecycle.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T20:35:49.926Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bd945ce32a4fbe5fbc7f83

Added to database: 3/20/2026, 6:39:24 PM

Last enriched: 3/27/2026, 7:42:26 PM

Last updated: 4/29/2026, 12:03:53 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses