An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata.
This has been fixed in pypdf==6.10.0.
If you cannot upgrade yet, consider applying the changes from PR #3724.
{
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-776"
],
"github_reviewed_at": "2026-04-10T20:59:36Z"
}