Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4xc4-762w-m6cg | pypdf has possible long runtimes for missing /Root object with large /Size values |
Thu, 22 Jan 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pypdf Project
Pypdf Project pypdf |
|
| CPEs | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pypdf Project
Pypdf Project pypdf |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 14 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Py-pdf
Py-pdf pypdf |
|
| Vendors & Products |
Py-pdf
Py-pdf pypdf |
Sat, 10 Jan 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pypdf is a free and open-source pure-python PDF library. Prior to version 6.6.0, pypdf has possible long runtimes for missing /Root object with large /Size values. An attacker who uses this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be achieved by omitting the /Root entry in the trailer, while using a rather large /Size value. Only the non-strict reading mode is affected. This issue has been patched in version 6.6.0. | |
| Title | pypdf has possible long runtimes for missing /Root object with large /Size values | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-12T17:07:00.323Z
Reserved: 2026-01-08T19:23:09.854Z
Link: CVE-2026-22690
Updated: 2026-01-12T17:06:56.573Z
Status : Analyzed
Published: 2026-01-10T05:16:01.847
Modified: 2026-01-22T15:35:23.627
Link: CVE-2026-22690
OpenCVE Enrichment
Updated: 2026-04-18T07:15:25Z
Github GHSA