Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-33472

CVE-2026-33472: Cryptomator Auth Bypass Vulnerability

CVE-2026-33472 is an authentication bypass flaw in Cryptomator that allows attackers to circumvent security checks via port manipulation. This article covers the technical details, affected versions, and mitigation steps.

Published: April 16, 2026

CVE-2026-33472 Overview

CVE-2026-33472 is an authentication bypass vulnerability in Cryptomator, an open-source client-side encryption application for cloud storage. Version 1.19.1 contains a logic flaw in CheckHostTrustController.getAuthority() that allows an attacker to bypass the security fix for CVE-2026-32303. The method hardcodes the URI scheme based on port number, causing HTTPS URLs with port 80 to produce the same authority string as HTTP URLs, which defeats both the consistency check and the HTTP block validation.

An attacker with write access to a cloud-synced vault.cryptomator file can craft a Hub configuration where apiBaseUrl and authEndpoint use HTTPS with port 80 to pass auto-trust validation, while tokenEndpoint uses plaintext HTTP. The vault is auto-trusted without user prompt, and a network-positioned attacker can intercept the OAuth token exchange to access the Cryptomator Hub API as the victim.

Critical Impact

Network-positioned attackers can intercept OAuth tokens and impersonate victims on the Cryptomator Hub API by exploiting the URI scheme logic flaw in trust validation.

Affected Products

  • Cryptomator version 1.19.1
  • Cryptomator versions prior to 1.19.2

Discovery Timeline

  • 2026-04-16 - CVE CVE-2026-33472 published to NVD
  • 2026-04-16 - Last updated in NVD database

Technical Details for CVE-2026-33472

Vulnerability Analysis

This vulnerability is classified under CWE-305 (Authentication Bypass by Primary Weakness), representing a fundamental flaw in how Cryptomator validates trusted hosts during the OAuth authentication flow. The issue arises from an incorrect assumption in the CheckHostTrustController.getAuthority() method, where the URI scheme (HTTP vs HTTPS) is determined solely based on the port number rather than the actual protocol specified in the URL.

When processing URLs, the method assumes that port 80 always indicates HTTP and port 443 always indicates HTTPS. This creates a scenario where an HTTPS URL explicitly using port 80 (e.g., https://malicious-server.com:80/) is incorrectly treated as HTTP for authority string generation purposes. This bypass defeats the security measures implemented in response to CVE-2026-32303.

Root Cause

The root cause is a hardcoded port-to-scheme mapping in the getAuthority() method that does not account for non-standard port configurations. The method prioritizes port number over the actual URI scheme, creating an inconsistency between how URLs are validated during trust checks versus how they are processed during actual OAuth token exchange operations. This logic flaw allows mixed-protocol configurations to pass validation when they should be rejected.

Attack Vector

The attack requires an adversary with write access to a cloud-synced vault.cryptomator file. The attacker crafts a malicious Hub configuration with carefully chosen URLs:

  1. The attacker sets apiBaseUrl and authEndpoint to use HTTPS URLs with port 80 (e.g., https://hub.example.com:80/api)
  2. The attacker sets tokenEndpoint to use plaintext HTTP
  3. When the victim opens the vault, the auto-trust validation passes because all endpoints produce identical authority strings
  4. The HTTP block validation is also bypassed due to the scheme confusion
  5. During OAuth token exchange, the tokenEndpoint communicates over unencrypted HTTP
  6. A network-positioned attacker (man-in-the-middle) intercepts the OAuth token
  7. The attacker uses the stolen token to access the Cryptomator Hub API as the victim

The vulnerability is exploitable without user interaction beyond opening a compromised vault file, though it requires the attacker to have both write access to the vault configuration and network positioning for token interception.

Detection Methods for CVE-2026-33472

Indicators of Compromise

  • Unexpected modifications to vault.cryptomator files in cloud-synced directories
  • Hub configuration URLs using HTTPS with non-standard port 80
  • OAuth token exchange traffic occurring over plaintext HTTP
  • Discrepancies between configured endpoint schemes and actual network traffic protocols

Detection Strategies

  • Monitor for modifications to vault.cryptomator files, particularly changes to apiBaseUrl, authEndpoint, and tokenEndpoint fields
  • Implement network traffic analysis to detect OAuth token exchanges occurring over unencrypted HTTP connections
  • Review cloud storage audit logs for unauthorized modifications to Cryptomator vault configuration files
  • Deploy endpoint detection rules to alert on Cryptomator processes making HTTP connections to authentication endpoints

Monitoring Recommendations

  • Enable file integrity monitoring on directories containing Cryptomator vault files
  • Configure network security tools to flag HTTP traffic containing OAuth tokens or authorization codes
  • Implement alerting for Cryptomator Hub API access from unusual IP addresses or geolocations
  • Monitor for patterns indicating man-in-the-middle positioning on network segments used by Cryptomator clients

How to Mitigate CVE-2026-33472

Immediate Actions Required

  • Upgrade Cryptomator to version 1.19.2 or later immediately
  • Review all vault.cryptomator files for suspicious Hub configurations, particularly endpoints using non-standard port configurations
  • Revoke and regenerate any OAuth tokens that may have been compromised
  • Audit cloud storage access logs for unauthorized modifications to vault configuration files

Patch Information

This vulnerability has been fixed in Cryptomator version 1.19.2. The fix addresses the logic flaw in CheckHostTrustController.getAuthority() to properly validate URI schemes independently of port numbers. Users should upgrade immediately by downloading the latest release from the official GitHub Release page. Additional technical details about the fix are available in Pull Request #4179 and the GitHub Security Advisory GHSA-9q8x-whrw-x44p.

Workarounds

  • Manually verify that all Hub configuration endpoints in vault.cryptomator files use consistent HTTPS URLs with standard ports before opening vaults
  • Avoid using cloud-synced vaults in untrusted network environments until the patch is applied
  • Implement strict access controls on cloud storage to prevent unauthorized modification of vault configuration files
  • Use network-level protections (VPN, secure DNS) to reduce man-in-the-middle attack opportunities
bash
# Verify Cryptomator version is patched
cryptomator --version
# Expected output: 1.19.2 or higher

# Inspect vault configuration for suspicious endpoints (Linux/macOS)
cat /path/to/vault.cryptomator | grep -E "(apiBaseUrl|authEndpoint|tokenEndpoint)"
# Ensure all endpoints use HTTPS with standard ports (443 or omitted)

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechCryptomator

  • SeverityMEDIUM

  • CVSS Score4.8

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-305
  • Technical References
  • GitHub Pull Request #4179

  • GitHub Release 1.19.2

  • GitHub Security Advisory GHSA-9q8x-whrw-x44p
  • Related CVEs
  • CVE-2026-32317: Cryptomator Auth Bypass Vulnerability

  • CVE-2026-32303: Cryptomator Auth Bypass Vulnerability

  • CVE-2026-32318: Cryptomator Auth Bypass Vulnerability

  • CVE-2026-32309: Cryptomator Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English