CVE-2025-62500
Published: 17 March 2026
Summary
CVE-2025-62500 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Canva Affinity. Its CVSS base score is 6.1 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the out-of-bounds read vulnerability in Canva Affinity's EMF parser through timely patching as specified in vendor advisories.
Implements memory protections like ASLR and DEP to prevent unauthorized out-of-bounds reads from disclosing sensitive memory contents during EMF file processing.
Validates specially crafted EMF file inputs to ensure they conform to expected formats, mitigating malformed data that triggers the out-of-bounds read.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OOB read in EMF parser enables info disclosure via crafted file opened by user (T1204.002 Malicious File).
NVD Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Deeper analysisAI
CVE-2025-62500 is an out-of-bounds read vulnerability (CWE-125) in the EMF functionality of Canva Affinity. The issue, published on 2026-03-17, allows exploitation via a specially crafted EMF file, potentially leading to the disclosure of sensitive information. It has a CVSS v3.1 base score of 6.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L), indicating medium severity with high confidentiality impact but low availability impact.
An attacker with local access can exploit this vulnerability by tricking a user into opening a malicious EMF file in Canva Affinity, requiring no privileges or special attacker conditions beyond low-complexity preparation and user interaction. Successful exploitation triggers an out-of-bounds read, enabling potential leakage of sensitive memory contents, though integrity and availability impacts are minimal.
Mitigation details are available in advisories from Talos Intelligence (TALOS-2025-2298) and Canva's trust center (trust.canva.com). Security practitioners should consult these references for patch information, workarounds, and affected versions.
Details
- CWE(s)