CVE-2026-27628
Published: 25 February 2026
Summary
CVE-2026-27628 is a high-severity Infinite Loop (CWE-835) vulnerability in Pypdf Project Pypdf. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 17.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Infinite loop in PDF parsing library directly enables application exploitation resulting in endpoint DoS via resource exhaustion.
NVD Description
pypdf is a free and open-source pure-python PDF library. Prior to 6.7.2, an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires reading the file. This has been fixed in pypdf 6.7.2.…
more
As a workaround, one may apply the patch manually.
Deeper analysisAI
CVE-2026-27628 is a denial-of-service vulnerability in pypdf, a free and open-source pure-python PDF library. Versions prior to 6.7.2 are affected, where processing a specially crafted PDF file triggers an infinite loop (CWE-835: Loop with Unreachable Exit Condition). The issue has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting high availability impact with no requirements for privileges or user interaction.
A remote attacker can exploit this vulnerability by crafting a malicious PDF file and inducing a victim to process it using a vulnerable pypdf installation, such as in a PDF parsing application or service. This leads to an infinite loop during file reading, causing resource exhaustion and denial of service on the affected system or process.
The vulnerability has been fixed in pypdf version 6.7.2. As a workaround, users can manually apply the patch from the referenced commit. Official advisories and discussions are available in the pypdf GitHub security advisory (GHSA-2rw7-x74f-jg35) and related issues.
Details
- CWE(s)