An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access.
This has been fixed in pypdf==6.0.0.
If you cannot upgrade yet, you might want to implement the workaround for pypdf.filters.decompress yourself: https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143
This issue has been reported in #3429 and fixed in #3430.
{
"nvd_published_at": "2025-08-13T23:15:27Z",
"github_reviewed_at": "2025-08-13T19:51:24Z",
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-400",
"CWE-770"
]
}