Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Published: 2026-03-17
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data disclosure
Action: Patch ASAP
AI Analysis

Impact

The vulnerability is an out-of-bounds read that occurs when the Affinity application processes EMF files. An attacker who supplies a specially crafted EMF file can trigger the overflow and read memory that may contain sensitive data, exposing confidential information. The weakness corresponds to CWE-125, indicating an out-of-bounds read that can lead to information disclosure.

Affected Systems

Affects Canva's Affinity product running on Windows platforms. No specific product versions are listed in the CVE data, but the CPE identifier cpe:2.3:a:canva:affinity:*:*:*:*:*:windows:*:* indicates all versions of Affinity on Windows could be impacted.

Risk and Exploitability

The CVSS score of 6.1 classifies the issue as moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Although the official attacker’s path is not explicitly described, the description implies that the attack vector requires an attacker to supply a malicious EMF file, which could be delivered via email, web download, or local file import. This inference indicates that the vulnerability is primarily exploitable through local or remote file inclusion when the application allows EMF files from arbitrary sources.

Generated by OpenCVE AI on March 19, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor-released security patch for Affinity as soon as it becomes available.
  • Disable or restrict processing of EMF files if the functionality is unnecessary; consider blocking the file type in the application settings.
  • Configure the operating system or security software to flag or quarantine untrusted EMF files before opening.
  • Verify that all files are sourced from trusted origins and monitor for suspicious attachments.
  • Keep the operating system and application up to date with the latest security updates.

Generated by OpenCVE AI on March 19, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Out‑of‑Bounds Read in Affinity EMF Processing leads to Data Disclosure

Thu, 19 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:canva:affinity:*:*:*:*:*:windows:*:*

Wed, 18 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:canva:affinity:-:*:*:*:*:windows:*:*

Wed, 18 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 21:30:00 +0000


Tue, 17 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Canva
Canva affinity
CPEs cpe:2.3:a:canva:affinity:-:*:*:*:*:windows:*:*
Vendors & Products Canva
Canva affinity

Tue, 17 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2026-03-18T17:00:11.883Z

Reserved: 2025-12-05T13:10:47.212Z

Link: CVE-2025-64733

cve-icon Vulnrichment

Updated: 2026-03-17T20:11:27.362Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T19:15:58.757

Modified: 2026-03-19T12:25:04.240

Link: CVE-2025-64733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:51Z

Weaknesses