CVE-2026-41168: pypdf has long runtimes for wrong size values in cross-reference and object streams
(updated )
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires cross-reference streams with wrong large /Size values or object streams with wrong large /N values.
References
- github.com/advisories/GHSA-jj6c-8h6c-hppx
- github.com/py-pdf/pypdf
- github.com/py-pdf/pypdf/commit/62338e9d36419cf193ccec7331784f45df1d70b3
- github.com/py-pdf/pypdf/pull/3733
- github.com/py-pdf/pypdf/releases/tag/6.10.1
- github.com/py-pdf/pypdf/security/advisories/GHSA-jj6c-8h6c-hppx
- nvd.nist.gov/vuln/detail/CVE-2026-41168
Code Behaviors & Features
Detect and mitigate CVE-2026-41168 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →