CVE-2025-64735

| EUVD-2025-208798 MEDIUM
2026-03-17 talos
6.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
EUVD ID Assigned
Mar 17, 2026 - 20:30 euvd
EUVD-2025-208798
Analysis Generated
Mar 17, 2026 - 20:30 vuln.today
CVE Published
Mar 17, 2026 - 18:52 nvd
MEDIUM 6.1

Description

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.

Analysis

An out-of-bounds read vulnerability exists in Canva Affinity's EMF (Enhanced Metafile) file processing functionality, affecting Affinity 3.0.1.3808 and potentially other versions. An attacker can craft a malicious EMF file that, when opened by a user in Affinity, triggers an out-of-bounds memory read, allowing disclosure of sensitive information from adjacent memory regions. While the CVSS score of 6.1 indicates moderate severity with high confidentiality impact, actual exploitation requires user interaction (opening a file) and is limited to information disclosure without code execution capability.

Technical Context

The vulnerability resides in Canva Affinity's EMF file parser, a component responsible for reading and rendering Windows Enhanced Metafile format documents. EMF is a vector graphics format commonly used in Windows environments that contains structured records defining drawing commands. The root cause is classified under CWE-125 (Out-of-bounds Read), indicating insufficient bounds checking when parsing EMF record structures or bitmap data embedded within EMF files. The affected product is identified via CPE (cpe:2.3:a:canva:affinity:*:*:*:*:*:*:*:*), confirming this affects the Canva Affinity application suite. When the parser processes a specially crafted EMF file with malformed record headers or oversized data sections, it fails to validate memory access boundaries, allowing reads beyond allocated buffer limits and exposing heap or stack memory contents.

Affected Products

Canva Affinity version 3.0.1.3808 is explicitly confirmed as vulnerable via EUVD-2025-208798. The CPE specification cpe:2.3:a:canva:affinity:*:*:*:*:*:*:*:* indicates that multiple versions of Affinity may be affected, though the specific version 3.0.1.3808 has been formally documented. Users are advised to check the Canva security advisory at https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62 for the complete list of affected versions and available patches. The Talos Intelligence report at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2312 provides additional technical context.

Remediation

Immediately upgrade Canva Affinity to the patched version specified in the vendor advisory at https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62. Check the Talos report (https://talosintelligence.com/vulnerability_reports/TALOS-2025-2312) for the exact patched version number. Until patching is completed, implement administrative controls by disabling EMF file handling if possible, or restrict user ability to open EMF files from untrusted sources (external emails, downloads, web applications). Educate users to avoid opening EMF files from unverified senders. For enterprise deployments, monitor application logs for EMF file processing errors that may indicate exploitation attempts. Consider file-type restrictions or sandboxing of Affinity for users who handle files from high-risk sources.

Priority Score

31
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +30
POC: 0

Share

CVE-2025-64735 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy