Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wgvp-vg3v-2xq3 | pypdf has possible long runtimes/large memory usage for large /ToUnicode streams |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pypdf Project
Pypdf Project pypdf |
|
| CPEs | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pypdf Project
Pypdf Project pypdf |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Py-pdf
Py-pdf pypdf |
|
| Vendors & Products |
Py-pdf
Py-pdf pypdf |
Sat, 21 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1050 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 20 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes and large memory consumption. This requires parsing the /ToUnicode entry of a font with unusually large values, for example during text extraction. This vulnerability is fixed in 6.7.1. | |
| Title | pypdf has possible long runtimes/large memory usage for large /ToUnicode streams | |
| Weaknesses | CWE-834 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T18:40:02.655Z
Reserved: 2026-02-17T03:08:23.490Z
Link: CVE-2026-27025
Updated: 2026-02-24T18:39:54.252Z
Status : Analyzed
Published: 2026-02-20T22:16:28.850
Modified: 2026-02-24T15:16:48.360
Link: CVE-2026-27025
OpenCVE Enrichment
Updated: 2026-02-23T14:35:05Z
Github GHSA