Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61979: CWE-125: Out-of-bounds Read in Canva Affinity

0
Medium
VulnerabilityCVE-2025-61979cvecve-2025-61979cwe-125
Published: Tue Mar 17 2026 (03/17/2026, 18:52:49 UTC)
Source: CVE Database V5
Vendor/Project: Canva
Product: Affinity

Description

CVE-2025-61979 is an out-of-bounds read vulnerability in the EMF (Enhanced Metafile) processing functionality of Canva Affinity version 3. 0. 1. 3808. An attacker can exploit this by crafting a malicious EMF file that triggers an out-of-bounds read, potentially leaking sensitive information from memory. The vulnerability requires local access and user interaction to open the malicious file but does not require privileges or authentication. The CVSS score of 6. 1 reflects a medium severity, primarily due to the confidentiality impact and limited attack vector. No known exploits are currently reported in the wild, and no patches have been published yet. Organizations using Canva Affinity for graphic design should be cautious when handling untrusted EMF files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:04:39 UTC

Technical Analysis

CVE-2025-61979 is a medium-severity vulnerability classified under CWE-125 (Out-of-bounds Read) affecting Canva Affinity version 3.0.1.3808. The flaw exists in the EMF (Enhanced Metafile) functionality, where improper bounds checking allows an attacker to read memory outside the intended buffer boundaries. By delivering a specially crafted EMF file and convincing a user to open it, an attacker can trigger this out-of-bounds read, potentially disclosing sensitive information residing in adjacent memory areas. The vulnerability does not allow code execution or integrity modification but compromises confidentiality by leaking data. The attack vector is local with low complexity, requiring user interaction but no privileges or authentication. The CVSS 3.1 score of 6.1 reflects a medium impact primarily on confidentiality with limited availability impact and no integrity impact. No public exploits or patches are currently available, indicating a window of exposure. The vulnerability highlights risks in handling complex graphic file formats and the importance of robust input validation in multimedia applications. Organizations relying on Canva Affinity for design workflows should monitor for updates and consider restricting EMF file usage until remediation is available.

Potential Impact

The primary impact of CVE-2025-61979 is the potential disclosure of sensitive information due to out-of-bounds memory reads when processing malicious EMF files. This can lead to leakage of confidential data such as user credentials, cryptographic keys, or other sensitive application memory contents. Although it does not allow code execution or system compromise, the confidentiality breach can facilitate further attacks or data exposure. The requirement for user interaction and local access limits remote exploitation but does not eliminate risk, especially in environments where untrusted files are shared or downloaded. For organizations, this vulnerability could undermine trust in design assets and expose proprietary or personal information. The absence of patches increases exposure duration, and the medium severity rating suggests a moderate but non-critical threat. Industries with high reliance on graphic design software, including media, marketing, and creative sectors, face operational risks if exploited. Additionally, regulatory compliance regarding data protection could be impacted if sensitive information is leaked.

Mitigation Recommendations

To mitigate CVE-2025-61979, organizations should implement the following specific measures: 1) Restrict or disable the import and opening of EMF files from untrusted or unknown sources within Canva Affinity until a patch is released. 2) Employ application whitelisting and sandboxing to isolate Canva Affinity processes and limit the impact of potential memory disclosures. 3) Monitor and control file sharing channels to prevent distribution of malicious EMF files internally. 4) Use endpoint protection solutions capable of detecting anomalous file parsing or memory access patterns related to EMF processing. 5) Educate users about the risks of opening unsolicited or suspicious graphic files and enforce strict user interaction policies. 6) Regularly check for vendor updates and apply patches promptly once available. 7) Consider network segmentation to limit exposure of systems running Canva Affinity. 8) Utilize memory protection technologies such as ASLR and DEP to reduce the risk of exploitation. These targeted actions go beyond generic advice by focusing on file type restrictions, user behavior, and process isolation specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-12-05T13:07:13.321Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aedc771bdb1749d1520a

Added to database: 3/17/2026, 7:43:24 PM

Last enriched: 3/25/2026, 1:04:39 AM

Last updated: 5/1/2026, 6:30:07 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses