Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32317: CWE-346: Origin Validation Error in cryptomator android

0
High
Published: Fri Mar 20 2026 (03/20/2026, 18:29:01 UTC)
Source: CVE Database V5
Vendor/Project: cryptomator
Product: android

Description

CVE-2026-32317 is a high-severity vulnerability in Cryptomator for Android versions prior to 1. 12. 3. It stems from an origin validation error where the client trusted endpoints specified in the vault configuration file without verifying host authenticity. This flaw allows an attacker who can tamper with the vault. cryptomator file to mix legitimate authentication endpoints with malicious API endpoints, leading to token exfiltration via a man-in-the-middle attack during the Hub key loading process. Exploitation requires the attacker to have the capability to alter the vault configuration file and the user to unlock a Hub-backed vault with a vulnerable client version. The vulnerability impacts confidentiality by exposing authentication tokens but does not affect availability. The issue has been patched in version 1. 12.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:37:56 UTC

Technical Analysis

Cryptomator for Android provides client-side encryption for cloud-stored files, ensuring data confidentiality across platforms. Prior to version 1.12.3, a critical vulnerability (CVE-2026-32317) existed due to improper origin validation (CWE-346) in the vault configuration file handling. Specifically, the client trusted endpoints defined in the vault.cryptomator file without verifying their authenticity or origin, allowing an attacker with the ability to modify this file to inject malicious API endpoints alongside legitimate authentication endpoints. This manipulation leads to a man-in-the-middle (MitM) scenario during the Hub key loading mechanism, where authentication tokens can be exfiltrated. The vulnerability requires low attack complexity (no special privileges beyond user-level, but user interaction is needed to unlock the vault) and network-level access to alter the vault file. The flaw impacts confidentiality severely by exposing sensitive tokens, while integrity is slightly affected due to tampering potential, and availability remains unaffected. The vulnerability is classified under multiple CWEs including origin validation error (CWE-346), improper authorization (CWE-354), exposure of sensitive information (CWE-451), and improper control of resource identifiers (CWE-923). The issue was publicly disclosed on March 20, 2026, with a CVSS v3.1 score of 7.6 (high severity). The vendor has addressed the vulnerability in Cryptomator Android version 1.12.3 by implementing proper host authenticity checks on endpoints specified in the vault configuration file, mitigating the risk of token theft and MitM attacks. No known exploits have been reported in the wild to date.

Potential Impact

This vulnerability primarily threatens the confidentiality of user authentication tokens, which can be exfiltrated by attackers capable of modifying the vault configuration file. Such token theft could allow unauthorized access to encrypted vaults or associated cloud services, potentially exposing sensitive user data. The integrity of the vault configuration is also compromised, as attackers can inject malicious endpoints, undermining trust in the client’s communication channels. Although availability is not directly impacted, the breach of confidentiality could lead to broader security incidents, including unauthorized data access or lateral movement within organizational environments. Organizations relying on Cryptomator Android clients for secure cloud file encryption, especially in environments where vault files are stored on shared or less secure storage, face increased risk. Attackers with network or local access to alter vault files could exploit this vulnerability to intercept authentication tokens, facilitating further attacks or data breaches. The vulnerability’s exploitation complexity is moderate, requiring user interaction and the ability to tamper with vault files, but the impact on confidentiality is high, making it a significant risk for users and organizations prioritizing data privacy and security.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should immediately update Cryptomator for Android to version 1.12.3 or later, where the issue is patched. Beyond patching, it is critical to enforce strict access controls on vault.cryptomator files to prevent unauthorized modification, including using secure storage solutions and applying file integrity monitoring. Network segmentation and endpoint security measures should be implemented to reduce the risk of attackers gaining the ability to alter vault files. Additionally, educating users about the risks of unlocking vaults in untrusted environments can reduce exposure. Organizations should also consider implementing multi-factor authentication (MFA) for cloud services integrated with Cryptomator to limit the impact of token theft. Regular audits of vault configuration files and monitoring for unusual authentication activity can help detect exploitation attempts early. Finally, developers should review and enhance origin validation and endpoint authentication mechanisms in client applications to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.660Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd97dde32a4fbe5fbf1af6

Added to database: 3/20/2026, 6:54:21 PM

Last enriched: 3/27/2026, 7:37:56 PM

Last updated: 5/2/2026, 1:25:49 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses