pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires parsing the content stream of a page which has an inline image using the DCTDecode filter. This has been fixed in pypdf version 6.1.3.
References
| Link | Resource |
|---|---|
| https://github.com/py-pdf/pypdf/commit/f2864d6dd9bac7cecd3f4f54308b25ebbfa178f8 | Patch |
| https://github.com/py-pdf/pypdf/pull/3501 | Patch |
| https://github.com/py-pdf/pypdf/releases/tag/6.1.3 | Release Notes |
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-vr63-x8vc-m265 | Third Party Advisory |
Configurations
History
27 Oct 2025, 20:25
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pypdf Project
Pypdf Project pypdf |
|
| CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/py-pdf/pypdf/commit/f2864d6dd9bac7cecd3f4f54308b25ebbfa178f8 - Patch | |
| References | () https://github.com/py-pdf/pypdf/pull/3501 - Patch | |
| References | () https://github.com/py-pdf/pypdf/releases/tag/6.1.3 - Release Notes | |
| References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-vr63-x8vc-m265 - Third Party Advisory |
22 Oct 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-22 22:15
Updated : 2025-10-27 20:25
NVD link : CVE-2025-62707
Mitre link : CVE-2025-62707
CVE.ORG link : CVE-2025-62707
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-834
Excessive Iteration
