The vulnerability lies in the xfa property of the DocCommon class in pypdf/_doc_common.py. The analysis of the patch commit 7a4c8246ed48d9d328fb596942271da47b6d109c clearly shows the replacement of an unbounded zlib.decompress call with a size-limited custom function _decompress_with_limit. The vulnerability is a classic resource exhaustion (CWE-400) issue, where a specially crafted compressed input (a 'zip bomb') in the XFA part of a PDF can cause the application to run out of memory. The vulnerable function DocCommon.xfa is the entry point for processing this malicious input. Both PdfReader and PdfWriter classes inherit from DocCommon, so any code accessing the .xfa property on instances of these classes would trigger the vulnerability.