Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65119: CWE-125: Out-of-bounds Read in Canva Affinity

0
Medium
VulnerabilityCVE-2025-65119cvecve-2025-65119cwe-125
Published: Tue Mar 17 2026 (03/17/2026, 18:52:29 UTC)
Source: CVE Database V5
Vendor/Project: Canva
Product: Affinity

Description

CVE-2025-65119 is an out-of-bounds read vulnerability in the EMF functionality of Canva Affinity version 3. 0. 1. 3808. An attacker can exploit this by providing a specially crafted EMF file, causing the application to read memory beyond its intended boundaries. This can lead to the disclosure of sensitive information without requiring privileges but does require user interaction to open the malicious file. The vulnerability has a CVSS score of 6. 1, indicating medium severity, with high impact on confidentiality but no impact on integrity and low impact on availability. No known exploits are currently reported in the wild. Organizations using Canva Affinity should be cautious when handling EMF files and monitor for updates or patches.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:07:05 UTC

Technical Analysis

CVE-2025-65119 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting the EMF (Enhanced Metafile) processing functionality in Canva Affinity version 3.0.1.3808. The flaw arises when the application processes a specially crafted EMF file, leading to an out-of-bounds read condition. This means the software reads memory outside the allocated buffer boundaries, potentially exposing sensitive information stored in adjacent memory regions. The vulnerability does not allow code execution or modification of data but can leak confidential information, impacting confidentiality. Exploitation requires user interaction, specifically opening or importing a malicious EMF file, and does not require any privileges, making it accessible to unprivileged attackers. The CVSS v3.1 score is 6.1, reflecting a medium risk with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope remains unchanged (S:U), with high confidentiality impact (C:H), no integrity impact (I:N), and low availability impact (A:L). No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. This vulnerability is significant for organizations that use Canva Affinity for graphic design, especially when handling EMF files from untrusted sources. Attackers could leverage this to extract sensitive data from memory, potentially including user data or application internals.

Potential Impact

The primary impact of CVE-2025-65119 is the potential disclosure of sensitive information due to out-of-bounds memory reads. While it does not allow code execution or system compromise, leaking confidential data can lead to privacy violations, intellectual property exposure, or leakage of sensitive user information. For organizations, this could result in data breaches, regulatory non-compliance, and reputational damage. The requirement for user interaction limits mass exploitation but targeted attacks against high-value users or organizations remain a concern. The vulnerability affects availability minimally and does not affect data integrity. Since Canva Affinity is used globally in creative industries, marketing, and design sectors, organizations relying on this software for sensitive projects or client data are at risk. The absence of known exploits reduces immediate threat but does not eliminate future risk once exploit code becomes available.

Mitigation Recommendations

Organizations should implement several specific mitigations to reduce risk from CVE-2025-65119: 1) Avoid opening or importing EMF files from untrusted or unknown sources within Canva Affinity until a patch is available. 2) Employ endpoint security solutions capable of scanning and blocking malicious EMF files. 3) Use application whitelisting and sandboxing to isolate Canva Affinity processes, limiting potential data exposure. 4) Monitor for official patches or updates from Canva and apply them promptly once released. 5) Educate users about the risks of opening unsolicited or suspicious EMF files. 6) Consider disabling or restricting EMF file support in Canva Affinity if feasible. 7) Implement network-level controls to detect and block delivery of malicious EMF files via email or file sharing platforms. These targeted actions go beyond generic advice by focusing on the specific attack vector and software environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-12-10T16:22:18.287Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aee0771bdb1749d152c9

Added to database: 3/17/2026, 7:43:28 PM

Last enriched: 3/25/2026, 1:07:05 AM

Last updated: 5/2/2026, 9:01:48 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses