HomeCryptomatorCVE-2026-32310

CVE-2026-32310

MEDIUM
4.1CVSS
Published: 2026-03-20
Updated: 2026-03-25
AI Analysis

Description

Cryptomator encrypts data being stored on cloud infrastructure. From version 1.6.0 to before version 1.19.1, vault configuration is parsed before its integrity is verified, and the masterkeyfile loader uses the unverified keyId as a filesystem path. The loader resolves keyId.getSchemeSpecificPart() directly against the vault path and immediately calls Files.exists(...). This allows a malicious vault config to supply parent-directory escapes, absolute local paths, or UNC paths (e.g., masterkeyfile://attacker/share/masterkey.cryptomator). On Windows, the UNC variant is especially dangerous because Path.resolve("//attacker/share/...") becomes \\attacker\share\..., so the existence check can trigger outbound SMB access before the user even enters a passphrase. This issue has been patched in version 1.19.1.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
changed
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-22

Metadata

Primary Vendor
CRYPTOMATOR
Published
3/20/2026
Last Modified
3/25/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cryptomator : cryptomator

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-32310 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com