We found results for “”
CVE-2025-62708
Good to know:
Date: October 22, 2025
pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Handling of Highly Compressed Data (Data Amplification)
CWE-409Top Fix
Upgrade Version
Upgrade to version pypdf - 6.1.3;pypdf - 6.1.3;https://github.com/py-pdf/pypdf.git - 6.1.3
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


