Description
pypdf is a free and open-source pure-python PDF library. Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. This issue has been fixed in 6.0.0. If an update is not possible, a workaround involves including the fixed code from pypdf.filters.decompress into the existing filters file.
INFO
Published Date :
2025-08-13T23:03:02.018Z
Last Modified :
2025-08-14T14:50:48.663Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-55197 vulnerability.
| Vendors | Products |
|---|---|
| Pypdf Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-55197.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact