CVE-2025-62403

6.1 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in Canva Affinity's EMF file processing allows attackers to read memory beyond allocated buffers via specially crafted EMF files. This could lead to sensitive information disclosure. Users of Canva Affinity software are affected.

💻 Affected Systems

Products:
  • Canva Affinity
Versions: Versions prior to the security patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing EMF files, which could come from various sources including downloads, email attachments, or shared documents.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete memory disclosure including authentication tokens, passwords, or other sensitive application data leading to credential theft or further system compromise.

🟠

Likely Case

Partial memory disclosure revealing application state, file fragments, or non-critical system information without direct code execution.

🟢

If Mitigated

Information disclosure limited to non-sensitive application data with proper sandboxing and memory protection controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious EMF file. No authentication is required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Canva Affinity updates for latest patched version

Vendor Advisory: https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62

Restart Required: Yes

Instructions:

1. Open Canva Affinity application
2. Navigate to Help > Check for Updates
3. Install any available updates
4. Restart the application

🔧 Temporary Workarounds

Disable EMF file processing

all

Prevent Canva Affinity from processing EMF files by modifying file associations

Windows: assoc .emf=
macOS: Remove EMF file association from Canva Affinity in System Preferences > General > File Handlers

Use application sandboxing

all

Run Canva Affinity in restricted environment to limit impact of memory disclosure

Windows: Use Windows Sandbox or AppContainer
macOS: Use sandbox-exec or built-in app sandboxing

🧯 If You Can't Patch

  • Implement strict file validation policies to block EMF files from untrusted sources
  • Use endpoint detection and response (EDR) tools to monitor for suspicious file processing behavior

🔍 How to Verify

Check if Vulnerable:

Check Canva Affinity version against vendor advisory. If using unpatched version and can process EMF files, system is vulnerable.

Check Version:

Windows: Check About dialog in Canva Affinity. macOS: Select Canva Affinity > About Canva Affinity from menu bar.

Verify Fix Applied:

Verify Canva Affinity version is updated to patched version and test with known safe EMF files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing EMF files
  • Unusual memory access patterns in application logs
  • Failed file parsing attempts

Network Indicators:

  • Downloads of EMF files from untrusted sources
  • Unusual outbound connections after EMF file processing

SIEM Query:

source="*canva*" AND (event="crash" OR event="memory_access_violation") AND file_extension="emf"

🔗 References

📤 Share & Export