CVE-2025-65119
Published: 17 March 2026
Summary
CVE-2025-65119 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Canva Affinity. Its CVSS base score is 6.1 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the vulnerability by requiring timely flaw remediation through patching Canva Affinity's EMF parser as advised in vendor updates.
Mandates validation of EMF file inputs to reject malformed files that trigger out-of-bounds reads during parsing.
Implements memory protections like address space layout randomization to mitigate information disclosure from out-of-bounds memory reads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability is triggered by opening a specially crafted local EMF file, directly mapping to user execution of a malicious file.
NVD Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Deeper analysisAI
An out-of-bounds read vulnerability, tracked as CVE-2025-65119 and associated with CWE-125, affects the EMF functionality in Canva Affinity. Published on 2026-03-17, this issue allows exploitation via a specially crafted EMF file, enabling an out-of-bounds read that could disclose sensitive information. The vulnerability carries a CVSS v3.1 base score of 6.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L), indicating medium severity with high confidentiality impact.
Attackers can exploit this vulnerability by convincing a user to open a maliciously crafted EMF file in Canva Affinity on a local system. No privileges are required (PR:N), but local access (AV:L) and user interaction (UI:R), such as opening the file, are necessary. Successful exploitation leads to an out-of-bounds read, potentially exposing sensitive information from memory, with low impact on integrity and availability.
Mitigation details are available in advisories from Talos Intelligence (TALOS-2025-2320) and Canva's trust center (https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62). Security practitioners should consult these references for patch information, workarounds, or updated versions of Canva Affinity to address the issue.
Details
- CWE(s)