Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Published: 2026-03-17
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Disclosure
Action: Apply Patch
AI Analysis

Impact

An out-of-bounds read vulnerability (CWE-125) has been identified in the EMF processing component of Canva Affinity. The flaw allows a malformed EMF file to cause the application to read data from memory beyond the intended bounds. If successfully triggered, this can expose confidential data that resides outside the intended buffer, potentially leaking sensitive information to an attacker. The description explicitly states that "an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information."

Affected Systems

The affected product is Canva Affinity, which runs on Windows platforms as indicated by the CPE string. No specific version numbers are disclosed in the provided data, so all releases of the product should be considered potentially vulnerable until a vendor update is confirmed.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate severity, while the EPSS score of less than 1% suggests that current exploitation attempts are unlikely. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the attack requires an attacker to supply a specially crafted EMF file; the victim must open or process the file, which could occur through an email attachment, a download, or an automated import feature. The requirement for user interaction or automatic processing limits the breadth of possible exploitation vectors, but the potential for sensitive data leakage remains significant if the flaw is exploited.

Generated by OpenCVE AI on March 19, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Canva’s support or download page for the latest Affinity release and apply any available security patch. If no patch is available, contact Canva’s support to confirm whether a hotfix is planned.
  • Configure the operating system or the application’s whitelist to block or restrict the opening of EMF files from untrusted sources.
  • If the EMF viewing or processing feature is not required for your operation, consider disabling it in the Affinity configuration to eliminate the attack surface.

Generated by OpenCVE AI on March 19, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Read Vulnerability in Canva Affinity EMF Functionality

Thu, 19 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:canva:affinity:*:*:*:*:*:windows:*:*

Wed, 18 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:canva:affinity:-:*:*:*:*:windows:*:*

Wed, 18 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 21:30:00 +0000


Tue, 17 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Canva
Canva affinity
CPEs cpe:2.3:a:canva:affinity:-:*:*:*:*:windows:*:*
Vendors & Products Canva
Canva affinity

Tue, 17 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2026-03-18T17:00:14.138Z

Reserved: 2025-12-05T13:29:31.669Z

Link: CVE-2025-66000

cve-icon Vulnrichment

Updated: 2026-03-17T20:11:32.201Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T19:15:59.417

Modified: 2026-03-19T12:09:04.657

Link: CVE-2025-66000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:52Z

Weaknesses