CVE-2025-64733
Published: 17 March 2026
Summary
CVE-2025-64733 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Canva Affinity. Its CVSS base score is 6.1 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the out-of-bounds read vulnerability by requiring timely flaw remediation through patching Canva Affinity as per vendor advisories.
Validates inputs such as specially crafted EMF files to prevent exploitation of the parsing flaw leading to information disclosure.
Provides runtime memory protections like address space layout randomization to mitigate unauthorized disclosure from out-of-bounds reads in EMF processing.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability is triggered by user opening a specially crafted malicious EMF file in the affected application, directly enabling T1204.002 User Execution: Malicious File for information disclosure.
NVD Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Deeper analysisAI
CVE-2025-64733 is an out-of-bounds read vulnerability (CWE-125) in the EMF functionality of Canva Affinity. Published on 2026-03-17, it carries a CVSS v3.1 base score of 6.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L). The flaw can be triggered by processing a specially crafted EMF file, potentially leading to the disclosure of sensitive information.
The vulnerability requires local access and user interaction, with low attack complexity and no privileges needed. An attacker could exploit it by tricking a user into opening a malicious EMF file within Canva Affinity, resulting in an out-of-bounds read. This achieves high confidentiality impact through sensitive information disclosure, alongside low availability impact and no integrity impact.
Mitigation guidance is available in advisories from Talos Intelligence (TALOS-2025-2300) and Canva's trust center.
Details
- CWE(s)