VYPR
Moderate severityOSV Advisory· Published Dec 10, 2025· Updated Dec 10, 2025

HTTP/HTTPS Traffic Interception Bypass in mad-proxy

CVE-2025-67485

Description

mad-proxy is a Python-based HTTP/HTTPS proxy server for detection and blocking of malicious web activity using custom security policies. Versions 0.3 and below allow attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic. This issue does not have a fix at the time of publication.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

mad-proxy versions 0.3 and below allow attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic.

Vulnerability

Overview

CVE-2025-67485 affects mad-proxy, a Python-based HTTP/HTTPS proxy server designed for detection and blocking of malicious web activity using custom security policies. In versions 0.3 and below, the proxy fails to properly enforce its traffic interception rules, allowing attackers to bypass the intended inspection and blocking mechanisms. This flaw stems from insufficient validation or handling of certain HTTP/HTTPS requests, enabling them to evade the policy engine entirely [1][2].

Exploitation

An attacker can exploit this vulnerability by sending specially crafted HTTP/HTTPS requests that are not correctly processed by the proxy's rule engine. The attack does not require authentication or special privileges, as the proxy is typically deployed as a transparent or forward proxy.forward proxy intercepting all traffic. The bypass can be triggered remotely, making it accessible to any adversary who can send traffic through the affected proxy instance [3].

Impact

Successful exploitation allows an attacker to circumvent the security policies defined in the proxy's YAML configuration, such as domain block/allow rules. This means malicious traffic—including connections to known command-and-control servers, phishing sites, or other dangerous destinations—can pass through undetected and unblocked. Consequently, sensitive data may be exfiltrated, and the protected network remains exposed to threats that the threats the proxy was intended to mitigate [1][3].

Mitigation

Status

As of the publication date, no official fix is available for CVE-2025-67485. The vendor advisories indicate that the issue is addressed in version 0.4 of mad-proxy, which fixes a related HTTPS interception bypass (CVE-2025-61767). Users are strongly advised to upgrade to v0.4 or later to remain protected [2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mad-proxyPyPI
<= 0.3

Affected products

2
  • Machphy/Mad ProxyOSV2 versions
    v0.1, v0.2, v0.3+ 1 more
    • (no CPE)range: v0.1, v0.2, v0.3
    • (no CPE)range: <=0.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.