CVE-2026-32317: CWE-346: Origin Validation Error in cryptomator android
CVE-2026-32317 is a high-severity vulnerability in Cryptomator for Android versions prior to 1. 12. 3. It stems from an origin validation error where the client trusted endpoints specified in the vault configuration file without verifying host authenticity. This flaw allows an attacker who can tamper with the vault. cryptomator file to mix legitimate authentication endpoints with malicious API endpoints, leading to token exfiltration via a man-in-the-middle attack during the Hub key loading process. Exploitation requires the attacker to have the capability to alter the vault configuration file and the user to unlock a Hub-backed vault with a vulnerable client version. The vulnerability impacts confidentiality by exposing authentication tokens but does not affect availability. The issue has been patched in version 1. 12.
AI Analysis
Technical Summary
Cryptomator for Android provides client-side encryption for cloud-stored files, ensuring data confidentiality across platforms. Prior to version 1.12.3, a critical vulnerability (CVE-2026-32317) existed due to improper origin validation (CWE-346) in the vault configuration file handling. Specifically, the client trusted endpoints defined in the vault.cryptomator file without verifying their authenticity or origin, allowing an attacker with the ability to modify this file to inject malicious API endpoints alongside legitimate authentication endpoints. This manipulation leads to a man-in-the-middle (MitM) scenario during the Hub key loading mechanism, where authentication tokens can be exfiltrated. The vulnerability requires low attack complexity (no special privileges beyond user-level, but user interaction is needed to unlock the vault) and network-level access to alter the vault file. The flaw impacts confidentiality severely by exposing sensitive tokens, while integrity is slightly affected due to tampering potential, and availability remains unaffected. The vulnerability is classified under multiple CWEs including origin validation error (CWE-346), improper authorization (CWE-354), exposure of sensitive information (CWE-451), and improper control of resource identifiers (CWE-923). The issue was publicly disclosed on March 20, 2026, with a CVSS v3.1 score of 7.6 (high severity). The vendor has addressed the vulnerability in Cryptomator Android version 1.12.3 by implementing proper host authenticity checks on endpoints specified in the vault configuration file, mitigating the risk of token theft and MitM attacks. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability primarily threatens the confidentiality of user authentication tokens, which can be exfiltrated by attackers capable of modifying the vault configuration file. Such token theft could allow unauthorized access to encrypted vaults or associated cloud services, potentially exposing sensitive user data. The integrity of the vault configuration is also compromised, as attackers can inject malicious endpoints, undermining trust in the client’s communication channels. Although availability is not directly impacted, the breach of confidentiality could lead to broader security incidents, including unauthorized data access or lateral movement within organizational environments. Organizations relying on Cryptomator Android clients for secure cloud file encryption, especially in environments where vault files are stored on shared or less secure storage, face increased risk. Attackers with network or local access to alter vault files could exploit this vulnerability to intercept authentication tokens, facilitating further attacks or data breaches. The vulnerability’s exploitation complexity is moderate, requiring user interaction and the ability to tamper with vault files, but the impact on confidentiality is high, making it a significant risk for users and organizations prioritizing data privacy and security.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should immediately update Cryptomator for Android to version 1.12.3 or later, where the issue is patched. Beyond patching, it is critical to enforce strict access controls on vault.cryptomator files to prevent unauthorized modification, including using secure storage solutions and applying file integrity monitoring. Network segmentation and endpoint security measures should be implemented to reduce the risk of attackers gaining the ability to alter vault files. Additionally, educating users about the risks of unlocking vaults in untrusted environments can reduce exposure. Organizations should also consider implementing multi-factor authentication (MFA) for cloud services integrated with Cryptomator to limit the impact of token theft. Regular audits of vault configuration files and monitoring for unusual authentication activity can help detect exploitation attempts early. Finally, developers should review and enhance origin validation and endpoint authentication mechanisms in client applications to prevent similar vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Sweden, Switzerland, Japan, South Korea
CVE-2026-32317: CWE-346: Origin Validation Error in cryptomator android
Description
CVE-2026-32317 is a high-severity vulnerability in Cryptomator for Android versions prior to 1. 12. 3. It stems from an origin validation error where the client trusted endpoints specified in the vault configuration file without verifying host authenticity. This flaw allows an attacker who can tamper with the vault. cryptomator file to mix legitimate authentication endpoints with malicious API endpoints, leading to token exfiltration via a man-in-the-middle attack during the Hub key loading process. Exploitation requires the attacker to have the capability to alter the vault configuration file and the user to unlock a Hub-backed vault with a vulnerable client version. The vulnerability impacts confidentiality by exposing authentication tokens but does not affect availability. The issue has been patched in version 1. 12.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Cryptomator for Android provides client-side encryption for cloud-stored files, ensuring data confidentiality across platforms. Prior to version 1.12.3, a critical vulnerability (CVE-2026-32317) existed due to improper origin validation (CWE-346) in the vault configuration file handling. Specifically, the client trusted endpoints defined in the vault.cryptomator file without verifying their authenticity or origin, allowing an attacker with the ability to modify this file to inject malicious API endpoints alongside legitimate authentication endpoints. This manipulation leads to a man-in-the-middle (MitM) scenario during the Hub key loading mechanism, where authentication tokens can be exfiltrated. The vulnerability requires low attack complexity (no special privileges beyond user-level, but user interaction is needed to unlock the vault) and network-level access to alter the vault file. The flaw impacts confidentiality severely by exposing sensitive tokens, while integrity is slightly affected due to tampering potential, and availability remains unaffected. The vulnerability is classified under multiple CWEs including origin validation error (CWE-346), improper authorization (CWE-354), exposure of sensitive information (CWE-451), and improper control of resource identifiers (CWE-923). The issue was publicly disclosed on March 20, 2026, with a CVSS v3.1 score of 7.6 (high severity). The vendor has addressed the vulnerability in Cryptomator Android version 1.12.3 by implementing proper host authenticity checks on endpoints specified in the vault configuration file, mitigating the risk of token theft and MitM attacks. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability primarily threatens the confidentiality of user authentication tokens, which can be exfiltrated by attackers capable of modifying the vault configuration file. Such token theft could allow unauthorized access to encrypted vaults or associated cloud services, potentially exposing sensitive user data. The integrity of the vault configuration is also compromised, as attackers can inject malicious endpoints, undermining trust in the client’s communication channels. Although availability is not directly impacted, the breach of confidentiality could lead to broader security incidents, including unauthorized data access or lateral movement within organizational environments. Organizations relying on Cryptomator Android clients for secure cloud file encryption, especially in environments where vault files are stored on shared or less secure storage, face increased risk. Attackers with network or local access to alter vault files could exploit this vulnerability to intercept authentication tokens, facilitating further attacks or data breaches. The vulnerability’s exploitation complexity is moderate, requiring user interaction and the ability to tamper with vault files, but the impact on confidentiality is high, making it a significant risk for users and organizations prioritizing data privacy and security.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should immediately update Cryptomator for Android to version 1.12.3 or later, where the issue is patched. Beyond patching, it is critical to enforce strict access controls on vault.cryptomator files to prevent unauthorized modification, including using secure storage solutions and applying file integrity monitoring. Network segmentation and endpoint security measures should be implemented to reduce the risk of attackers gaining the ability to alter vault files. Additionally, educating users about the risks of unlocking vaults in untrusted environments can reduce exposure. Organizations should also consider implementing multi-factor authentication (MFA) for cloud services integrated with Cryptomator to limit the impact of token theft. Regular audits of vault configuration files and monitoring for unusual authentication activity can help detect exploitation attempts early. Finally, developers should review and enhance origin validation and endpoint authentication mechanisms in client applications to prevent similar vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-11T21:16:21.660Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bd97dde32a4fbe5fbf1af6
Added to database: 3/20/2026, 6:54:21 PM
Last enriched: 3/27/2026, 7:37:56 PM
Last updated: 5/2/2026, 1:25:49 PM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.