CVE-2026-32318

Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-20 19:16

Updated : 2026-03-26 13:48


NVD link : CVE-2026-32318

Mitre link : CVE-2026-32318

CVE.ORG link : CVE-2026-32318


JSON object : View

Products Affected

cryptomator

  • cryptomator

apple

  • iphone_os
CWE
CWE-346

Origin Validation Error

CWE-354

Improper Validation of Integrity Check Value

CWE-451

User Interface (UI) Misrepresentation of Critical Information

CWE-923

Improper Restriction of Communication Channel to Intended Endpoints