Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.0, in non-debug mode Cryptomator might leak cleartext paths into the log file. This can reveal meta information about the files stored inside a vault at a time, where the actual vault is closed. Not every cleartext path is logged. Only if a filesystem request fails for some reason (e.g. damaged encrypted file, not existing file), a log message is created. This issue has been patched in version 1.19.0.
References
| Link | Resource |
|---|---|
| https://github.com/cryptomator/cryptomator/security/advisories/GHSA-j83j-mwhc-rcgw | Mitigation Vendor Advisory |
Configurations
History
13 Mar 2026, 18:58
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:* | |
| First Time |
Cryptomator cryptomator
Cryptomator |
|
| References | () https://github.com/cryptomator/cryptomator/security/advisories/GHSA-j83j-mwhc-rcgw - Mitigation, Vendor Advisory |
06 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 18:16
Updated : 2026-03-13 18:58
NVD link : CVE-2026-29110
Mitre link : CVE-2026-29110
CVE.ORG link : CVE-2026-29110
JSON object : View
Products Affected
cryptomator
- cryptomator
CWE
CWE-209
Generation of Error Message Containing Sensitive Information
