CVE-2026-32303
EUVD-2026-1374620.03.2026, 18:16
Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.19.1.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| cryptomator | cryptomator | 𝑥 < 1.19.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration