Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64301: CWE-787: Out-of-bounds Write in Canva Affinity

0
High
VulnerabilityCVE-2025-64301cvecve-2025-64301cwe-787
Published: Tue Mar 17 2026 (03/17/2026, 18:52:44 UTC)
Source: CVE Database V5
Vendor/Project: Canva
Product: Affinity

Description

CVE-2025-64301 is a high-severity out-of-bounds write vulnerability in the EMF functionality of Canva Affinity version 3. 0. 1. 3808. An attacker can exploit this by crafting a malicious EMF file that triggers an out-of-bounds write, potentially leading to arbitrary code execution. The vulnerability requires local access and user interaction to open the malicious file but does not require privileges or authentication. This flaw impacts confidentiality, integrity, and availability, making it critical for affected users to apply mitigations promptly. No known exploits are currently in the wild, but the risk remains significant due to the potential for remote code execution. Organizations using Canva Affinity in creative and design workflows should prioritize patching once available and implement strict file handling policies. Countries with significant usage of Canva Affinity and high-value creative industries are at greater risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:05:33 UTC

Technical Analysis

CVE-2025-64301 is an out-of-bounds write vulnerability classified under CWE-787 affecting the EMF (Enhanced Metafile) processing functionality in Canva Affinity version 3.0.1.3808. The vulnerability arises when the application processes a specially crafted EMF file, which causes the software to write data outside the bounds of allocated memory buffers. This memory corruption can lead to arbitrary code execution, allowing an attacker to execute malicious code within the context of the affected application. The vulnerability requires the victim to open a malicious EMF file, implying user interaction is necessary, and the attack vector is local (AV:L). No privileges are required (PR:N), but the attacker must convince the user to open the file (UI:R). The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution can lead to data theft, system compromise, or denial of service. Although no patches are currently linked, the vulnerability is publicly disclosed and assigned a CVSS v3.1 score of 7.8, indicating high severity. No known exploits have been reported in the wild yet, but the potential for exploitation exists given the nature of the flaw. The vulnerability affects a widely used creative software product, making it a significant concern for organizations relying on Canva Affinity for design and content creation workflows.

Potential Impact

The impact of CVE-2025-64301 is substantial for organizations using Canva Affinity, especially in creative industries where the software is integral to daily operations. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain control over affected systems, steal sensitive design files, intellectual property, or deploy further malware. This compromises confidentiality, integrity, and availability of systems and data. Since the vulnerability requires user interaction to open a malicious EMF file, phishing or social engineering campaigns could be used to deliver the exploit. The local attack vector limits remote exploitation but does not eliminate risk, especially in environments where users frequently exchange files. The lack of current patches increases exposure time, and the absence of known exploits does not preclude future attacks. Organizations may face operational disruptions, data breaches, and reputational damage if exploited. The vulnerability also poses risks in environments with shared workstations or insufficient endpoint protections.

Mitigation Recommendations

To mitigate CVE-2025-64301, organizations should implement the following specific measures: 1) Restrict the opening of EMF files from untrusted or unknown sources within Canva Affinity until a vendor patch is released. 2) Employ application whitelisting and sandboxing techniques to isolate Canva Affinity processes and limit the impact of potential exploitation. 3) Educate users about the risks of opening unsolicited or suspicious EMF files, emphasizing cautious handling of email attachments and downloads. 4) Monitor and control file sharing channels to prevent distribution of malicious EMF files. 5) Use endpoint detection and response (EDR) tools to detect anomalous behaviors indicative of exploitation attempts. 6) Regularly back up critical design files and maintain incident response plans tailored to software compromise scenarios. 7) Once available, promptly apply vendor patches or updates addressing this vulnerability. 8) Consider disabling or limiting EMF file support in Canva Affinity if feasible within operational requirements. These targeted actions go beyond generic advice by focusing on the specific attack vector and software context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-12-05T16:28:22.882Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aede771bdb1749d1527a

Added to database: 3/17/2026, 7:43:26 PM

Last enriched: 3/25/2026, 1:05:33 AM

Last updated: 5/1/2026, 7:08:31 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses