CVE-2026-32309

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, the Hub-based unlock flow explicitly supports hub+http and consumes Hub endpoints from vault metadata without enforcing HTTPS. As a result, a vault configuration can drive OAuth and key-loading traffic over plaintext HTTP or other insecure endpoint combinations. An active network attacker can tamper with or observe this traffic. Even when the vault key is encrypted for the device, bearer tokens and endpoint-level trust decisions are still exposed to downgrade and interception. This issue has been patched in version 1.19.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:*

History

27 Mar 2026, 16:16

Type Values Removed Values Added
References () https://github.com/cryptomator/cryptomator/security/advisories/GHSA-vv33-h7qx-c264 - Vendor Advisory () https://github.com/cryptomator/cryptomator/security/advisories/GHSA-vv33-h7qx-c264 - Vendor Advisory

25 Mar 2026, 20:49

Type Values Removed Values Added
First Time Cryptomator cryptomator
Cryptomator
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/cryptomator/cryptomator/releases/tag/1.19.1 - () https://github.com/cryptomator/cryptomator/releases/tag/1.19.1 - Release Notes
References () https://github.com/cryptomator/cryptomator/security/advisories/GHSA-vv33-h7qx-c264 - () https://github.com/cryptomator/cryptomator/security/advisories/GHSA-vv33-h7qx-c264 - Vendor Advisory
CPE cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:*

25 Mar 2026, 15:16

Type Values Removed Values Added
Summary
  • (es) Cryptomator cifra los datos almacenados en infraestructura en la nube. Antes de la versión 1.19.1, el flujo de desbloqueo basado en Hub soporta explícitamente hub+http y consume puntos finales de Hub de los metadatos de la bóveda sin forzar HTTPS. Como resultado, una configuración de bóveda puede dirigir tráfico de OAuth y carga de claves sobre HTTP en texto plano o sobre otras combinaciones de puntos finales inseguras. Un atacante de red activo puede manipular u observar este tráfico. Incluso cuando la clave de la bóveda está cifrada para el dispositivo, los tokens de portador y las decisiones de confianza a nivel de punto final aún están expuestos a degradación e interceptación. Este problema ha sido parcheado en la versión 1.19.1.
References () https://github.com/cryptomator/cryptomator/security/advisories/GHSA-vv33-h7qx-c264 - () https://github.com/cryptomator/cryptomator/security/advisories/GHSA-vv33-h7qx-c264 -

20 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 19:16

Updated : 2026-03-27 16:16


NVD link : CVE-2026-32309

Mitre link : CVE-2026-32309

CVE.ORG link : CVE-2026-32309


JSON object : View

Products Affected

cryptomator

  • cryptomator
CWE
CWE-319

Cleartext Transmission of Sensitive Information