pypdf: Manipulated XMP metadata entity declarations can exhaust RAM
Description
Published to the GitHub Advisory Database
Apr 10, 2026
Reviewed
Apr 10, 2026
Last updated
Apr 10, 2026
Impact
An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata.
Patches
This has been fixed in pypdf==6.10.0.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3724.
References