CVE-2026-22882
Published: 17 March 2026
Summary
CVE-2026-22882 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Canva Affinity. Its CVSS base score is 6.1 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely remediation of the out-of-bounds read flaw in Canva Affinity's EMF parser through patches or updates.
Requires validation of EMF file inputs to detect and reject specially crafted malformed files that trigger the out-of-bounds read.
Implements runtime memory protections that limit the scope and impact of out-of-bounds reads, reducing potential sensitive information disclosure.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OOB read triggered by opening crafted local EMF file directly maps to malicious file user execution for info disclosure.
NVD Description
An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.
Deeper analysisAI
CVE-2026-22882 is an out-of-bounds read vulnerability (CWE-125) in the EMF functionality of Canva Affinity. Published on 2026-03-17, it can be exploited by processing a specially crafted EMF file, potentially leading to the disclosure of sensitive information. The vulnerability carries a CVSS v3.1 base score of 6.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).
An attacker with local access can exploit this vulnerability by tricking a user into opening a malicious EMF file through Canva Affinity, requiring no privileges but relying on user interaction. Successful exploitation enables an out-of-bounds read, achieving high-impact confidentiality loss such as sensitive data disclosure, with no integrity impact and only low availability disruption.
Advisories from Talos Intelligence (TALOS-2025-2325) and Canva's trust center provide additional details on the vulnerability, including potential mitigation guidance.
Details
- CWE(s)