Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @pdfme/pdf-lib
  4. ›
  5. GHSA-vrqm-gvq7-rrwh

GHSA-vrqm-gvq7-rrwh: PDFME Affected by Decompression Bomb in FlateDecode Stream Parsing Causes Memory Exhaustion DoS

March 20, 2026

The DecodeStream.ensureBuffer() method in @pdfme/pdf-lib doubles its internal buffer without any upper bound on the decompressed size. A crafted PDF containing a FlateDecode stream with a high compression ratio (decompression bomb) causes unbounded memory allocation during stream decoding, leading to memory exhaustion and denial of service in both server-side (generator) and client-side (UI) contexts.

References

  • github.com/advisories/GHSA-vrqm-gvq7-rrwh
  • github.com/pdfme/pdfme
  • github.com/pdfme/pdfme/security/advisories/GHSA-vrqm-gvq7-rrwh

Code Behaviors & Features

Detect and mitigate GHSA-vrqm-gvq7-rrwh with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.5.10

Fixed versions

  • 5.5.10

Solution

Upgrade to version 5.5.10 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-409: Improper Handling of Highly Compressed Data (Data Amplification)

Source file

npm/@pdfme/pdf-lib/GHSA-vrqm-gvq7-rrwh.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:19 +0000.