You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Tampered vault configuration allows MITM attack on Hub API
High
SailReal
published
GHSA-876q-q3mm-fcvjMar 20, 2026
Package
No package listed
Affected versions
< 1.12.3
Patched versions
1.12.3
Description
Impact
An integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism:
Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint.
Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file.
Important
Since Cryptomator Hub uses end-to-end encryption, vault data was never in danger.
We are not aware of any active exploitation of this vulnerability.
Patches
Version 1.12.3 adds the following mitigation mechanisms: Trust-on-first-contact (TOFU) host verification during unlock with explicit approval required by the user.
Workarounds
If upgrading is not immediately possible:
Restrict outbound client network access so Cryptomator can only reach trusted Hub hosts.
The product does not validate or incorrectly validates the integrity check values or checksums of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.
Learn more on MITRE.
The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
Learn more on MITRE.
The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint.
Learn more on MITRE.
Impact
An integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism:
Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint.
Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the
vault.cryptomatorfile.Important
Since Cryptomator Hub uses end-to-end encryption, vault data was never in danger.
We are not aware of any active exploitation of this vulnerability.
Patches
Version 1.12.3 adds the following mitigation mechanisms: Trust-on-first-contact (TOFU) host verification during unlock with explicit approval required by the user.
Workarounds
If upgrading is not immediately possible:
References
N/A