An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires parsing the content stream of a page which has an inline image using the DCTDecode filter.
This has been fixed in pypdf==6.1.3.
If you cannot upgrade yet, consider applying the changes from PR #3501.
{
"cwe_ids": [
"CWE-834"
],
"severity": "MODERATE",
"nvd_published_at": "2025-10-22T22:15:35Z",
"github_reviewed": true,
"github_reviewed_at": "2025-10-22T19:40:47Z"
}