CVE-2025-66617
📋 TL;DR
An out-of-bounds read vulnerability in Canva Affinity's EMF file processing allows attackers to read memory beyond allocated buffers via specially crafted EMF files. This could lead to disclosure of sensitive information from the application's memory space. Users of Canva Affinity software are affected.
💻 Affected Systems
- Canva Affinity
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Disclosure of sensitive information from application memory, potentially including authentication tokens, user data, or system information that could facilitate further attacks.
Likely Case
Information disclosure of limited memory contents, potentially revealing application state or partial data fragments.
If Mitigated
No impact if proper memory protections are in place or if the vulnerability is patched before exploitation.
🎯 Exploit Status
Exploitation requires user interaction to open malicious EMF file, but no authentication is needed once the file is processed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific version
Vendor Advisory: https://trust.canva.com/?tcuUid=1f728b0d-17f3-4c9c-97e9-6662b769eb62
Restart Required: Yes
Instructions:
1. Visit Canva's security advisory page
2. Download and install the latest version of Canva Affinity
3. Restart the application
🔧 Temporary Workarounds
Disable EMF file processing
allPrevent Canva Affinity from processing EMF files to block exploitation vectors
User education and file filtering
allTrain users to avoid opening untrusted EMF files and implement email/web filtering for EMF attachments
🧯 If You Can't Patch
- Implement application allowlisting to restrict execution of Canva Affinity to trusted systems only
- Deploy endpoint detection and response (EDR) solutions to monitor for suspicious memory access patterns
🔍 How to Verify
Check if Vulnerable:
Check Canva Affinity version against vendor advisory; if using unpatched version, assume vulnerable
Check Version:
Check within Canva Affinity application settings or about dialog
Verify Fix Applied:
Verify Canva Affinity version matches or exceeds patched version specified in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual application crashes when processing EMF files
- Memory access violation errors in application logs
Network Indicators:
- Downloads of EMF files from untrusted sources
- Unusual file transfer activity involving EMF files
SIEM Query:
source="*canva*" AND (event_type="crash" OR error="memory" OR file_type="emf")