Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47873: CWE-125: Out-of-bounds Read in Canva Affinity

0
Medium
VulnerabilityCVE-2025-47873cvecve-2025-47873cwe-125
Published: Tue Mar 17 2026 (03/17/2026, 18:52:35 UTC)
Source: CVE Database V5
Vendor/Project: Canva
Product: Affinity

Description

CVE-2025-47873 is an out-of-bounds read vulnerability in the EMF processing functionality of Canva Affinity version 3. 0. 1. 3808. An attacker can exploit this by crafting a malicious EMF file that triggers the vulnerability, potentially leading to unauthorized disclosure of sensitive information. The vulnerability requires local access and user interaction to open the malicious file but does not require privileges or authentication. The CVSS score is 6. 1 (medium severity), reflecting high confidentiality impact but limited integrity and availability impact. No known exploits are currently reported in the wild. Organizations using Canva Affinity for graphic design should be aware of this vulnerability and apply patches once available or implement mitigations to reduce risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:03:54 UTC

Technical Analysis

CVE-2025-47873 is a medium-severity vulnerability categorized as CWE-125 (Out-of-bounds Read) affecting the EMF (Enhanced Metafile) functionality in Canva Affinity version 3.0.1.3808. The vulnerability arises when the software processes specially crafted EMF files that cause it to read memory outside the intended buffer boundaries. This out-of-bounds read can lead to the disclosure of sensitive information stored in adjacent memory areas, potentially exposing confidential data to an attacker. Exploitation requires the victim to open a malicious EMF file, implying user interaction is necessary. The attack vector is local (AV:L), meaning the attacker must have the ability to deliver or convince the user to open the malicious file, but no privileges or authentication are required. The vulnerability does not affect integrity or availability but has a high impact on confidentiality. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in December 2025 and published in March 2026, indicating recent discovery and disclosure. The affected product, Canva Affinity, is a graphic design tool used globally, and the EMF format is a common vector for vector graphics, increasing the risk if malicious files are shared or downloaded.

Potential Impact

The primary impact of CVE-2025-47873 is the potential unauthorized disclosure of sensitive information due to out-of-bounds memory reads. For organizations, this could lead to leakage of confidential data, intellectual property, or user information embedded in memory during EMF file processing. Although the vulnerability does not allow code execution or system compromise, the confidentiality breach could facilitate further attacks or data exposure incidents. The requirement for user interaction limits large-scale automated exploitation but does not eliminate risk, especially in environments where users frequently exchange graphic files. Industries relying heavily on graphic design, marketing, and digital content creation are particularly at risk. Additionally, the lack of available patches at the time of disclosure increases exposure. The vulnerability could be leveraged in targeted phishing campaigns or supply chain attacks involving malicious EMF files. Overall, the impact is moderate but significant enough to warrant prompt attention.

Mitigation Recommendations

1. Monitor for official patches or updates from Canva and apply them immediately once available to remediate the vulnerability. 2. Until patches are released, implement strict file handling policies that restrict or scan EMF files before opening, using advanced endpoint protection or sandboxing solutions. 3. Educate users about the risks of opening unsolicited or suspicious graphic files, especially EMF files from untrusted sources. 4. Employ network-level controls to block or quarantine EMF files received via email or file-sharing platforms. 5. Use application whitelisting to limit execution of untrusted software and reduce the risk of malicious file processing. 6. Conduct regular security awareness training focusing on social engineering tactics that could deliver malicious files. 7. Consider disabling EMF file support in Canva Affinity if feasible or using alternative file formats until a fix is available. 8. Monitor logs and endpoint behavior for unusual activity related to file processing to detect potential exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-12-10T12:57:44.820Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aede771bdb1749d1526a

Added to database: 3/17/2026, 7:43:26 PM

Last enriched: 3/25/2026, 1:03:54 AM

Last updated: 5/1/2026, 12:06:08 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses