CVE-2025-66617
Published: 17 March 2026
Summary
CVE-2025-66617 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Canva Affinity. Its CVSS base score is 6.1 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the out-of-bounds read flaw in Canva Affinity's EMF parser through timely patching and updates.
Enforces validation of EMF file inputs to reject malformed structures that trigger out-of-bounds reads.
Implements memory protection mechanisms like address space layout randomization and data execution prevention to block exploitation of out-of-bounds reads for information disclosure.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds read in EMF parser triggered by opening a crafted file directly maps to user execution of a malicious file for information disclosure.
NVD Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Deeper analysisAI
CVE-2025-66617 is an out-of-bounds read vulnerability (CWE-125) in the EMF functionality of Canva Affinity software. Published on 2026-03-17, it carries a CVSS v3.1 base score of 6.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L). The issue allows an attacker using a specially crafted EMF file to trigger an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Exploitation requires local access vector with low attack complexity and no privileges, but depends on user interaction, such as opening the malicious EMF file in Canva Affinity. A successful attack can achieve high confidentiality impact through information disclosure, alongside low availability impact and no integrity impact, without affecting the scope of the impacted component.
Mitigation guidance is available in related advisories, including Talos Intelligence report TALOS-2025-2315 (https://talosintelligence.com/vulnerability_reports/TALOS-2025-2315 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2315) and Canva's trust center (https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62).
Details
- CWE(s)