Home

Description

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.19.1.

PUBLISHED Reserved 2026-03-11 | Published 2026-03-20 | Updated 2026-03-23 | Assigner GitHub_M




HIGH: 7.6CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

Problem types

CWE-346: Origin Validation Error

CWE-354: Improper Validation of Integrity Check Value

CWE-451: User Interface (UI) Misrepresentation of Critical Information

CWE-923: Improper Restriction of Communication Channel to Intended Endpoints

Product status

< 1.19.1
affected

References

github.com/...omator/security/advisories/GHSA-34rf-rwr3-7g43

github.com/cryptomator/cryptomator/pull/4179

github.com/...ommit/6b82abcd80449a30b561d823193f9ecea542a625

github.com/cryptomator/cryptomator/releases/tag/1.19.1

cve.org (CVE-2026-32303)

nvd.nist.gov (CVE-2026-32303)

Download JSON