Cyber Posture

CVE-2025-61952

MediumPublic PoC

Published: 17 March 2026

Published
17 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
EPSS Score 0.0001 2.5th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-61952 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Canva Affinity. Its CVSS base score is 6.1 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses the out-of-bounds read vulnerability by applying patches to Canva Affinity's EMF parsing functionality as advised in vendor updates.

prevent

Information input validation enforces proper bounds checking and sanitization of EMF files to prevent out-of-bounds reads during parsing.

prevent

Memory protection mechanisms like address space layout randomization and stack canaries mitigate information disclosure from out-of-bounds reads in the EMF processing.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

OOB read in client-side EMF parser enables info disclosure via malicious file opened by user.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.

Deeper analysisAI

An out-of-bounds read vulnerability, tracked as CVE-2025-61952 and associated with CWE-125, affects the EMF functionality in Canva Affinity software. Published on 2026-03-17, this issue allows exploitation via a specially crafted EMF file, enabling an out-of-bounds read that could disclose sensitive information. The vulnerability carries a CVSS v3.1 base score of 6.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L), indicating medium severity with high confidentiality impact.

A local attacker with no privileges required can exploit this vulnerability by tricking a user into opening a malicious EMF file through the affected EMF processing in Canva Affinity. Successful exploitation requires low complexity and user interaction but stays within the application's scope, potentially allowing the attacker to read sensitive data from memory while causing limited availability disruption and no integrity impact.

Mitigation details and further technical analysis are available in advisories from Talos Intelligence (TALOS-2025-2317) and Canva's trust center. Security practitioners should consult these references for patching guidance and updated information on Canva Affinity.

Details

CWE(s)

Affected Products

canva
affinity
≤ 3.1.0

CVEs Like This One

CVE-2025-64735Same product: Canva Affinity
CVE-2025-65119Same product: Canva Affinity
CVE-2026-22882Same product: Canva Affinity
CVE-2025-62500Same product: Canva Affinity
CVE-2025-62403Same product: Canva Affinity
CVE-2026-20726Same product: Canva Affinity
CVE-2025-61979Same product: Canva Affinity
CVE-2025-66503Same product: Canva Affinity
CVE-2025-64733Same product: Canva Affinity
CVE-2025-66617Same product: Canva Affinity

References