Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qpxp-75px-xjcp | pypdf has inefficient decoding of array-based streams |
Mon, 23 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pypdf Project
Pypdf Project pypdf |
|
| CPEs | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pypdf Project
Pypdf Project pypdf |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 20 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Py-pdf
Py-pdf pypdf |
|
| Vendors & Products |
Py-pdf
Py-pdf pypdf |
Fri, 20 Mar 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.1 allow an attacker to craft a malicious PDF which leads to long runtimes and/or large memory usage. Exploitation requires accessing an array-based stream with many entries. This issue has been fixed in version 6.9.1. | |
| Title | pypdf has inefficient decoding of array-based streams | |
| Weaknesses | CWE-400 CWE-407 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T18:07:16.458Z
Reserved: 2026-03-17T20:35:49.926Z
Link: CVE-2026-33123
Updated: 2026-03-20T16:04:05.465Z
Status : Analyzed
Published: 2026-03-20T10:16:18.717
Modified: 2026-03-23T15:48:01.007
Link: CVE-2026-33123
OpenCVE Enrichment
Updated: 2026-03-25T14:29:43Z
Github GHSA