Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65119: CWE-125: Out-of-bounds Read in Canva Affinity

0
Medium
VulnerabilityCVE-2025-65119cvecve-2025-65119cwe-125
Published: Tue Mar 17 2026 (03/17/2026, 18:52:29 UTC)
Source: CVE Database V5
Vendor/Project: Canva
Product: Affinity

Description

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.

AI-Powered Analysis

AILast updated: 03/17/2026, 20:00:33 UTC

Technical Analysis

CVE-2025-65119 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting Canva Affinity version 3.0.1.3808. The flaw exists in the Enhanced Metafile (EMF) file processing component, where improper bounds checking allows an attacker to read memory outside the intended buffer. By crafting a specially designed EMF file and convincing a user to open it within the vulnerable Canva Affinity application, an attacker can trigger this out-of-bounds read. This can lead to unauthorized disclosure of sensitive information residing in adjacent memory areas. The vulnerability does not permit code execution or modification of data, but the confidentiality impact is high due to potential leakage of sensitive information. Exploitation requires local access to the victim system and user interaction to open the malicious file, which limits remote exploitation. The CVSS v3.1 score of 6.1 reflects these factors: low attack vector (local), low attack complexity, no privileges required, user interaction required, unchanged scope, high confidentiality impact, no integrity or availability impact. No public exploits or patches are currently available, indicating the need for proactive mitigation. The vulnerability was reserved in December 2025 and published in March 2026 by the Talos team, highlighting its recent discovery. This vulnerability is particularly relevant for organizations relying on Canva Affinity for graphic design workflows involving EMF files, which are commonly used vector graphics formats in Windows environments.

Potential Impact

The primary impact of CVE-2025-65119 is the potential disclosure of sensitive information from the memory of systems running the vulnerable Canva Affinity version. This can include confidential design data, user credentials cached in memory, or other sensitive artifacts depending on the application context. Although it does not allow code execution or system compromise, information leakage can facilitate further attacks such as social engineering or privilege escalation. Organizations handling sensitive or proprietary graphic content are at risk of intellectual property exposure. The requirement for local access and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate insider threats or targeted attacks. The vulnerability could undermine trust in Canva Affinity’s security posture and lead to compliance issues if sensitive data is exposed. Given Canva’s global user base, the impact is relevant across multiple sectors including creative industries, marketing agencies, and enterprises using the software for internal documentation and design.

Mitigation Recommendations

1. Avoid opening EMF files from untrusted or unknown sources within Canva Affinity until a patch is released. 2. Implement strict file validation and scanning for EMF files at the gateway or endpoint level to detect malformed or suspicious files. 3. Use application whitelisting and sandboxing techniques to isolate Canva Affinity processes, limiting the impact of potential exploitation. 4. Educate users on the risks of opening unsolicited or unexpected EMF files, emphasizing cautious handling of email attachments and downloads. 5. Monitor system logs and application behavior for anomalies related to EMF file processing. 6. Coordinate with Canva for timely updates and patches addressing this vulnerability. 7. Consider disabling or restricting EMF file support in Canva Affinity if feasible within operational requirements. 8. Employ endpoint detection and response (EDR) tools to detect unusual memory access patterns that may indicate exploitation attempts. These measures go beyond generic advice by focusing on file handling policies, user awareness, and proactive detection tailored to the vulnerability’s characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-12-10T16:22:18.287Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aee0771bdb1749d152c9

Added to database: 3/17/2026, 7:43:28 PM

Last enriched: 3/17/2026, 8:00:33 PM

Last updated: 3/18/2026, 5:41:23 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses