Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66000: CWE-125: Out-of-bounds Read in Canva Affinity

0
Medium
VulnerabilityCVE-2025-66000cvecve-2025-66000cwe-125
Published: Tue Mar 17 2026 (03/17/2026, 18:52:46 UTC)
Source: CVE Database V5
Vendor/Project: Canva
Product: Affinity

Description

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.

AI-Powered Analysis

AILast updated: 03/17/2026, 20:00:18 UTC

Technical Analysis

CVE-2025-66000 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting the EMF (Enhanced Metafile) functionality in Canva Affinity version 3.0.1.3808. The vulnerability arises when the application processes a specially crafted EMF file, causing it to read memory outside the intended buffer boundaries. This out-of-bounds read can result in the disclosure of sensitive information from the application's memory space, potentially exposing confidential data to an attacker. The vulnerability requires the victim to open or interact with a malicious EMF file, making user interaction necessary for exploitation. The attack vector is local, meaning the attacker must have access to deliver the malicious file to the user, but no privileges or authentication are required. The CVSS 3.1 base score is 6.1, reflecting a medium severity level with high confidentiality impact, no integrity impact, and low availability impact. No known exploits have been reported in the wild to date. The vulnerability does not allow remote code execution or privilege escalation but can be leveraged for information disclosure attacks, which may aid further exploitation or reconnaissance. Canva Affinity is a graphic design tool widely used by creative professionals, and the EMF format is a common vector for vector graphics and image files, increasing the likelihood of encountering malicious files in shared environments. The lack of an official patch at the time of reporting necessitates immediate mitigation strategies to reduce risk.

Potential Impact

The primary impact of CVE-2025-66000 is the potential disclosure of sensitive information from the memory of systems running Canva Affinity 3.0.1.3808 when processing malicious EMF files. This can lead to leakage of confidential data such as user credentials, proprietary design elements, or other sensitive in-memory information. While the vulnerability does not allow code execution or system compromise directly, the information disclosure could facilitate subsequent targeted attacks or social engineering. Organizations relying on Canva Affinity for design workflows may face data confidentiality risks, especially if untrusted EMF files are received via email, file sharing, or collaboration platforms. The requirement for user interaction limits large-scale automated exploitation but does not eliminate risk in environments with high file exchange volumes. The vulnerability could affect availability minimally, as out-of-bounds reads may cause application crashes or instability. Overall, the threat is moderate but significant for organizations handling sensitive design data or intellectual property.

Mitigation Recommendations

1. Restrict the opening of EMF files from untrusted or unknown sources within Canva Affinity to reduce exposure to malicious files. 2. Implement strict file validation and scanning for EMF files using updated antivirus and endpoint protection solutions capable of detecting malformed EMF payloads. 3. Educate users about the risks of opening unsolicited or suspicious EMF files, emphasizing cautious handling of email attachments and downloads. 4. Monitor Canva Affinity vendor communications closely for official patches or updates addressing CVE-2025-66000 and apply them promptly once released. 5. Consider sandboxing or running Canva Affinity in isolated environments when processing EMF files from external sources to limit potential data exposure. 6. Employ network-level controls to block or flag EMF files in email gateways or file sharing platforms where feasible. 7. Conduct regular security assessments and memory analysis on systems running Canva Affinity to detect anomalous behavior indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-12-05T13:29:31.669Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aee0771bdb1749d152cd

Added to database: 3/17/2026, 7:43:28 PM

Last enriched: 3/17/2026, 8:00:18 PM

Last updated: 3/18/2026, 6:31:56 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses