CVE-2025-62500
Received Received - Intake
Out-of-Bounds Read in Canva Affinity EMF Risks Data Exposure

Publication date: 2026-03-17

Last updated on: 2026-03-19

Assigner: Talos

Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-17
Last Modified
2026-03-19
Generated
2026-05-07
AI Q&A
2026-03-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
canva affinity to 3.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-62500 is an out-of-bounds read vulnerability in the EMF (Enhanced Metafile Format) processing functionality of Canva Affinity, specifically in version 3.0.1.3808.

The vulnerability arises because the software does not properly validate certain fields (nDescription and offDescription) in the EMR_HEADER structure of an EMF file. These fields specify the location and length of a description string within the file.

If an attacker crafts a malicious EMF file where the sum of offDescription and nDescription exceeds the size of the header, the software reads memory beyond the intended buffer. This out-of-bounds read can lead to disclosure of sensitive information from memory.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to disclose sensitive information from the memory of the affected system.

Because the vulnerability involves reading memory outside the intended buffer, confidential data stored in memory could be exposed.

The attack requires local access and user interaction, but does not require privileges, and has a low attack complexity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the processing of specially crafted EMF files by Canva Affinity version 3.0.1.3808. Detection would focus on identifying the presence of such malicious EMF files or monitoring the application behavior during EMF file loading.

Since the vulnerability requires local access and user interaction, detection can include monitoring for unusual or unexpected EMF files being opened in Canva Affinity.

Specific commands to detect this vulnerability are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding opening untrusted or suspicious EMF files in Canva Affinity, especially version 3.0.1.3808.

Since the vulnerability requires local access and user interaction, restricting user access to Canva Affinity or disabling EMF file support temporarily can reduce risk.

Applying any available patches or updates from the software vendor once released is recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart