CVE-2025-61979

| EUVD-2025-208789 MEDIUM
2026-03-17 talos
6.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 17, 2026 - 20:30 vuln.today
EUVD ID Assigned
Mar 17, 2026 - 20:30 euvd
EUVD-2025-208789
CVE Published
Mar 17, 2026 - 18:52 nvd
MEDIUM 6.1

Description

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.

Analysis

An out-of-bounds read vulnerability exists in the EMF (Enhanced Metafile) file handling functionality of Canva Affinity, allowing an attacker to read memory beyond allocated buffer boundaries by crafting a malicious EMF file. This vulnerability affects Canva Affinity version 3.0.1.3808 and potentially earlier versions, and requires user interaction (opening a specially crafted file) but no elevated privileges to exploit. Successful exploitation can disclose sensitive information from process memory, with potential for limited availability impact; no public exploit code or active exploitation in the wild has been confirmed based on available intelligence.

Technical Context

The vulnerability resides in Canva Affinity's EMF (Enhanced Metafile) file parser, a graphics format commonly used in Windows environments for vector graphics and document rendering. The root cause is classified under CWE-125 (Out-of-bounds Read), a memory safety defect where the parser fails to properly validate buffer boundaries when reading EMF record structures or metadata. When a malformed EMF file is processed, the parser attempts to read beyond the allocated memory region assigned to store EMF data, potentially exposing adjacent heap or stack memory containing sensitive information such as encryption keys, API tokens, or other process state. The affected product is specifically Canva Affinity (CPE: cpe:2.3:a:canva:affinity:*:*:*:*:*:*:*:*), a design and productivity application that handles multiple file formats including EMF for compatibility with Microsoft Office and other tools.

Affected Products

Canva Affinity version 3.0.1.3808 is explicitly confirmed as vulnerable according to EUVD data. The generic CPE string cpe:2.3:a:canva:affinity:*:*:*:*:*:*:*:* suggests that earlier versions are likely affected, though the exact version range has not been formally disclosed in the available references. Users should consult the Canva security advisory at https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62 for definitive information regarding affected versions and patch availability. The Talos Intelligence vulnerability report (TALOS-2025-2299) at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2299 provides additional technical details and confirmation of the vulnerability.

Remediation

The primary remediation is to upgrade Canva Affinity to a patched version released by Canva following coordination with Talos Intelligence; users should immediately check the Canva security advisory at https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62 for available patches and apply them without delay. Until a patch is available or deployed, implement preventive controls by disabling EMF file import functionality if operationally feasible, educating users not to open EMF files from untrusted sources, and enforcing file type restrictions at the application level. Additionally, isolate systems running vulnerable Affinity versions from high-sensitivity networks and monitor process memory for signs of unauthorized access or data exfiltration through endpoint detection and response (EDR) tools if data classification warrants such monitoring.

Priority Score

31
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +30
POC: 0

Share

CVE-2025-61979 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy