CVE-2026-32303

HIGH

Cryptomator: Tampered vault configuration allows MITM attack on Hub API

Title source: cna
STIX 2.1

Description

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.19.1.

Scores

CVSS v3 7.6
EPSS 0.0002
EPSS Percentile 5.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-346 CWE-354 CWE-451 CWE-923
Status published
Products (1)
cryptomator/cryptomator < 1.19.1 (2 CPE variants)
Published Mar 20, 2026
Tracked Since Mar 21, 2026