Description
Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.0, in non-debug mode Cryptomator might leak cleartext paths into the log file. This can reveal meta information about the files stored inside a vault at a time, where the actual vault is closed. Not every cleartext path is logged. Only if a filesystem request fails for some reason (e.g. damaged encrypted file, not existing file), a log message is created. This issue has been patched in version 1.19.0.
Published: 2026-03-06
Score: 2.2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

Prior to version 1.19.0, Cryptomator may write cleartext file paths to its log file whenever a file system request fails, such as when an encrypted file is damaged or missing. This behavior leaks metadata about the contents stored in a vault at a time when the vault is closed, potentially revealing which files exist or were accessed. The flaw does not expose the encrypted data itself or allow execution of code; it is a confidentiality issue classified as CWE‑209.

Affected Systems

The vulnerability affects the Cryptomator application distributed by the Cryptomator team. All releases before version 1.19.0 are impacted. Users deploying these earlier versions should identify the exact version installed and consider an upgrade.

Risk and Exploitability

The CVSS score of 2.2 indicates a low-risk severity, and the EPSS score of less than 1 percent reflects a very low probability of exploitation. Because the log files are stored locally, an attacker would need local or remote access to the machine’s file system to read them, implying that the attack vector is most likely local. The vulnerability is not listed in the CISA KEV catalog, further underscoring its limited risk profile at this time, but it can still aid adversaries in fingerprinting the contents of a vault.

Generated by OpenCVE AI on April 16, 2026 at 11:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cryptomator to version 1.19.0 or later, which removes the logging of cleartext paths.
  • Configure file system permissions so that the log file directory is accessible only to trusted users, preventing unauthorized read access.
  • Reduce logging of filesystem failures, if the application provides an option, so that paths are no longer recorded; otherwise, ensure the logs are aggressively rotated and purged to limit the window of exposure.

Generated by OpenCVE AI on April 16, 2026 at 11:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cryptomator
Cryptomator cryptomator
Vendors & Products Cryptomator
Cryptomator cryptomator

Fri, 06 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.0, in non-debug mode Cryptomator might leak cleartext paths into the log file. This can reveal meta information about the files stored inside a vault at a time, where the actual vault is closed. Not every cleartext path is logged. Only if a filesystem request fails for some reason (e.g. damaged encrypted file, not existing file), a log message is created. This issue has been patched in version 1.19.0.
Title Cryptomator: Leaking of cleartext paths into log file in non-debug mode
Weaknesses CWE-209
References
Metrics cvssV3_1

{'score': 2.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}


Subscriptions

Cryptomator Cryptomator
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T18:33:33.603Z

Reserved: 2026-03-03T21:54:06.709Z

Link: CVE-2026-29110

cve-icon Vulnrichment

Updated: 2026-03-06T18:33:29.906Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T18:16:20.453

Modified: 2026-03-13T18:58:03.633

Link: CVE-2026-29110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:30:15Z

Weaknesses