CVE-2025-66342
Published: 17 March 2026
Summary
CVE-2025-66342 is a high-severity Type Confusion (CWE-843) vulnerability in Canva Affinity. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 1.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly mitigates this CVE by applying vendor patches to fix the type confusion vulnerability in Canva Affinity's EMF parsing.
Memory protection mechanisms such as ASLR and DEP prevent arbitrary code execution from memory corruption triggered by the type confusion in EMF files.
Information input validation ensures proper checking of EMF file structures to avoid type confusion during parsing.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directly triggered by user opening a malicious EMF file, enabling arbitrary code execution via memory corruption.
NVD Description
A type confusion vulnerability exists in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution.
Deeper analysisAI
CVE-2025-66342 is a type confusion vulnerability (CWE-843) in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this issue, leading to memory corruption and potential arbitrary code execution. The vulnerability was published on 2026-03-17 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Exploitation requires local access with low complexity and no privileges, but depends on user interaction, such as opening a malicious EMF file in Canva Affinity. A successful attack can achieve high impacts across confidentiality, integrity, and availability, enabling arbitrary code execution on the targeted system.
Mitigation details are available in advisories from Talos Intelligence (TALOS-2025-2297 at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2297 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2297) and Canva's trust center (https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62).
Details
- CWE(s)