An attacker who exploits this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be achieved by omitting the /Root entry in the trailer, while using a rather large /Size value. Only the non-strict reading mode is affected.
This has been fixed in pypdf==6.6.0.
from pypdf import PdfReader, PdfWriter
# Instead of
reader = PdfReader("file.pdf")
# use the strict mode:
reader = PdfReader("file.pdf", strict=True)
# Instead of
writer = PdfWriter(clone_from="file.pdf")
# use an explicit strict reader:
writer = PdfWriter(clone_from=PdfReader("file.pdf", strict=True))
This issue has been fixed in #3594.
{
"cwe_ids": [
"CWE-400"
],
"severity": "LOW",
"nvd_published_at": "2026-01-10T05:16:01Z",
"github_reviewed": true,
"github_reviewed_at": "2026-01-09T19:48:22Z"
}