CVE-2025-66342

7.8 HIGH

📋 TL;DR

A type confusion vulnerability in Canva Affinity's EMF file processing allows memory corruption when opening malicious EMF files. This can lead to arbitrary code execution with the privileges of the user running the application. All users of affected Canva Affinity software versions are vulnerable.

💻 Affected Systems

Products:
  • Canva Affinity Designer
  • Canva Affinity Photo
  • Canva Affinity Publisher
Versions: Versions prior to the security patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations that process EMF files are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or application crash when users open malicious EMF files from untrusted sources.

🟢

If Mitigated

Application crash without code execution if memory protections are enabled.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious file, but could be delivered via web downloads or email attachments.
🏢 Internal Only: MEDIUM - Similar risk profile, but limited to internal file sharing and user interaction requirements.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious EMF file. No authentication bypass needed beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Canva Affinity updates for latest patched version

Vendor Advisory: https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62

Restart Required: Yes

Instructions:

1. Open Canva Affinity application. 2. Navigate to Help > Check for Updates. 3. Install all available updates. 4. Restart the application.

🔧 Temporary Workarounds

Disable EMF file association

all

Remove EMF file type association with Canva Affinity applications

Windows: assoc .emf=
macOS: Remove Canva Affinity from Open With for EMF files

Block EMF files at perimeter

all

Filter or block EMF files at email gateways and web proxies

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution
  • Restrict user privileges to limit potential damage from exploitation

🔍 How to Verify

Check if Vulnerable:

Check Canva Affinity version against patched versions in vendor advisory

Check Version:

Windows: Check About in application menu; macOS: Check About [Application Name]

Verify Fix Applied:

Verify application version is updated to latest release and test with known safe EMF files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing EMF files
  • Unexpected memory access errors in application logs

Network Indicators:

  • Downloads of EMF files from untrusted sources
  • Unusual outbound connections after EMF file processing

SIEM Query:

source="*canva*" AND (event="crash" OR event="memory_error") AND file_extension="emf"

🔗 References

📤 Share & Export