Ad

CVE-2026-32303

HIGH CVSS 3.1: 5.9 EPSS 0.02%
Updated Mar 26, 2026
Cryptomator
Parameter Value
CVSS 5.9 (HIGH)
Affected Versions before 1.19.1
Fixed In 1.19.1
Type CWE-923, CWE-346 (Origin Validation Error), CWE-354, CWE-451
Vendor Cryptomator
Public PoC No

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint.

Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.19.1.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
High
Difficult to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Cryptomator Cryptomator
cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:*
1.19.1