CVE-2025-61979
Received Received - Intake
Out-of-Bounds Read in Canva Affinity EMF Risks Data Exposure

Publication date: 2026-03-17

Last updated on: 2026-03-19

Assigner: Talos

Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-17
Last Modified
2026-03-19
Generated
2026-05-06
AI Q&A
2026-03-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
canva affinity to 3.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2025-61979 is an out-of-bounds read vulnerability in the EMF (Enhanced Metafile Format) processing functionality of Canva Affinity version 3.0.1.3808.'}, {'type': 'paragraph', 'content': "The vulnerability occurs because the application improperly validates the 'offDescription' field within the EMR_HEADER structure of an EMF file. Specifically, if the sum of 'offDescription' (the offset to the EmfDescription string) and 'nDescription' (the number of characters in the EmfDescription) exceeds the total size of the EMR_HEADER record ('recordSize'), the application reads memory outside the intended bounds."}, {'type': 'paragraph', 'content': "This out-of-bounds read happens when the application tries to access the EmfDescription string by adding 'offDescription' to the base pointer of the EMR_HEADER. If 'offDescription' is larger than 'recordSize', this points to an invalid memory region, causing an access violation."}, {'type': 'paragraph', 'content': 'Exploitation of this vulnerability allows an attacker to read arbitrary memory within the process, potentially disclosing sensitive information.'}] [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to perform an out-of-bounds read in the Canva Affinity application when processing a specially crafted EMF file.

As a result, the attacker could read arbitrary memory within the process, which may lead to the disclosure of sensitive information.

The CVSS score indicates a high confidentiality impact, meaning that sensitive data could be exposed, but there is no impact on integrity and only a low impact on availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing EMF files processed by Canva Affinity version 3.0.1.3808 for malformed EMR_HEADER structures, specifically checking the offDescription and nDescription fields for out-of-bounds conditions.

One approach is to monitor or audit EMF files for suspicious or specially crafted content that could trigger out-of-bounds reads.

Since the vulnerability involves improper validation of the offDescription field within the EMR_HEADER structure, you can use debugging or memory analysis tools to detect access violations or crashes related to EMF file processing.

Suggested commands/tools include:

  • Use a debugger with pageheap enabled to monitor Canva Affinity while opening EMF files to catch access violations (e.g., using WinDbg or Visual Studio Debugger).
  • Use file inspection tools or scripts to parse EMF files and verify that offDescription + nDescription does not exceed the recordSize in the EMR_HEADER.
  • Monitor application logs or Windows Event Viewer for exceptions or access violation errors (code c0000005) related to Canva Affinity.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to apply the patch released by Canva on March 17, 2026, which addresses this vulnerability.

Until the patch is applied, avoid opening or processing untrusted or specially crafted EMF files with Canva Affinity version 3.0.1.3808.

Additionally, restrict local user access to Canva Affinity to prevent exploitation since the attack vector is local and requires user interaction.

Implement monitoring for unusual application crashes or access violations that could indicate exploitation attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart