Impact
Cryptomator’s Hub unlocking flow permits Hub endpoints to be transmitted over plain HTTP and accepts unvalidated endpoint schemes. This flaw allows attacker to observe or tamper with OAuth bearer tokens and key‑loading traffic that should otherwise travel securely. The vulnerability is an instance of insecure transmission of sensitive information.
Affected Systems
All users of Cryptomator running versions older than 1.19.1 and employing the Hub‑based unlock mechanism are affected. The issue originates from vault configuration files that store Hub endpoint definitions without enforcing HTTPS.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity for confidentiality and integrity. EPSS is below 1 %, suggesting a low likelihood of exploitation. It is inferred that a network attacker who can intercept traffic to the Hub service could exploit the flaw. The vulnerability is not listed in the CISA KEV catalog. Exposing bearer tokens and endpoint decisions can lead to unauthorized access if an attacker successfully downgrades the communication channel.
OpenCVE Enrichment