An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter.
This has been fixed in pypdf==6.1.3.
If you cannot upgrade yet, consider applying the changes from PR #3502.
{
"github_reviewed": true,
"nvd_published_at": "2025-10-22T22:15:35Z",
"cwe_ids": [
"CWE-409"
],
"github_reviewed_at": "2025-10-22T19:40:50Z",
"severity": "MODERATE"
}