CVE-2025-65119

6.1 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in Canva Affinity's EMF file processing allows attackers to read memory beyond allocated buffers via specially crafted EMF files. This could lead to sensitive information disclosure. Users of Affinity software who process untrusted EMF files are affected.

💻 Affected Systems

Products:
  • Canva Affinity software with EMF functionality
Versions: Versions prior to patch
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations that process EMF files are vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure leading to exposure of sensitive data like credentials, encryption keys, or other application secrets stored in memory

🟠

Likely Case

Application crash or disclosure of non-sensitive memory contents

🟢

If Mitigated

No impact with proper input validation and memory protection controls

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious file
🏢 Internal Only: MEDIUM - Same attack vector applies internally

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to open malicious EMF file; no authentication bypass needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62

Restart Required: Yes

Instructions:

1. Visit Canva's security advisory page
2. Download and install the latest Affinity update
3. Restart the application

🔧 Temporary Workarounds

Disable EMF file processing

all

Prevent Affinity from processing EMF files

Use file type restrictions

all

Configure system to block EMF files from untrusted sources

🧯 If You Can't Patch

  • Implement application allowlisting to restrict which applications can open EMF files
  • Use network segmentation to isolate systems running vulnerable versions

🔍 How to Verify

Check if Vulnerable:

Check Affinity version against vendor advisory; if pre-patch version, vulnerable

Check Version:

Check within Affinity application settings or about dialog

Verify Fix Applied:

Verify Affinity version matches or exceeds patched version in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing EMF files
  • Unusual memory access patterns

Network Indicators:

  • Downloads of EMF files from untrusted sources

SIEM Query:

Search for EMF file extensions in download logs or application crash events

🔗 References

📤 Share & Export