Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Published: 2026-03-17
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-Bounds Read and Potential Data Disclosure
Action: Apply Patch
AI Analysis

Impact

An out-of-bounds read vulnerability exists in the Enhanced Metafile (EMF) functionality of Canva Affinity. Attackers can craft a malicious EMF file to trigger the read beyond allowed boundaries, potentially exposing sensitive information. The core weakness is a buffer over-read (CWE-125), which may allow an adversary to read memory content that the application should not access. The impact is primarily confidentiality compromise, producing possible disclosure of arbitrary memory contents. The vulnerability does not directly lead to code execution or denial of service, but any sensitive data revealed could assist in further attacks. Based on the description, it is inferred that the vulnerability is exploitable via a user-supplied EMF file, possibly through file import or opening actions.

Affected Systems

Vulnerable systems include Canva Affinity running on Windows. Specific affected product is Canva Affinity. Detailed version information is not provided in the CNA data, so any installation of Canva Affinity that includes the EMF module may be at risk unless otherwise noted by the vendor. The exact scope of affected releases remains unclear.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate severity. EPSS indicates a very low likelihood of exploitation (<1%). The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector involves a malicious EMF file supplied to the target user. Exploitation requires opening or processing the file within the application, so user interaction or privilege is needed. Once exploited, the attacker can read memory data that should be inaccessible. No evidence suggests the attacker can obtain higher privileges or execute arbitrary code from the advent of the read. The risk is therefore limited to data exposure but can be significant if the exposed data is highly confidential.

Generated by OpenCVE AI on March 19, 2026 at 13:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify and apply any vendor patches or updates for Canva Affinity as soon as they become available
  • Restrict the use of EMF files from untrusted sources or implement file validation to block malformed EMF files
  • Monitor for related alerts on vendor or security advisory sites
  • Consider temporarily disabling EMF support if not needed, pending a patch

Generated by OpenCVE AI on March 19, 2026 at 13:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Read in Canva Affinity EMF Functionality

Thu, 19 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:canva:affinity:*:*:*:*:*:windows:*:*

Wed, 18 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:canva:affinity:-:*:*:*:*:windows:*:*

Wed, 18 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 21:30:00 +0000


Tue, 17 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Canva
Canva affinity
CPEs cpe:2.3:a:canva:affinity:-:*:*:*:*:windows:*:*
Vendors & Products Canva
Canva affinity

Tue, 17 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2026-03-18T17:00:18.161Z

Reserved: 2025-12-10T12:54:52.978Z

Link: CVE-2025-58427

cve-icon Vulnrichment

Updated: 2026-03-17T20:11:21.010Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T19:15:57.763

Modified: 2026-03-19T12:22:32.020

Link: CVE-2025-58427

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:56Z

Weaknesses