HTTP/HTTPS Traffic Interception Bypass in mad-proxy
Description
mad-proxy is a Python-based HTTP/HTTPS proxy server for detection and blocking of malicious web activity using custom security policies. Versions 0.3 and below allow attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic. This issue does not have a fix at the time of publication.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
mad-proxy versions 0.3 and below allow attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic.
Vulnerability
Overview
CVE-2025-67485 affects mad-proxy, a Python-based HTTP/HTTPS proxy server designed for detection and blocking of malicious web activity using custom security policies. In versions 0.3 and below, the proxy fails to properly enforce its traffic interception rules, allowing attackers to bypass the intended inspection and blocking mechanisms. This flaw stems from insufficient validation or handling of certain HTTP/HTTPS requests, enabling them to evade the policy engine entirely [1][2].
Exploitation
An attacker can exploit this vulnerability by sending specially crafted HTTP/HTTPS requests that are not correctly processed by the proxy's rule engine. The attack does not require authentication or special privileges, as the proxy is typically deployed as a transparent or forward proxy.forward proxy intercepting all traffic. The bypass can be triggered remotely, making it accessible to any adversary who can send traffic through the affected proxy instance [3].
Impact
Successful exploitation allows an attacker to circumvent the security policies defined in the proxy's YAML configuration, such as domain block/allow rules. This means malicious traffic—including connections to known command-and-control servers, phishing sites, or other dangerous destinations—can pass through undetected and unblocked. Consequently, sensitive data may be exfiltrated, and the protected network remains exposed to threats that the threats the proxy was intended to mitigate [1][3].
Mitigation
Status
As of the publication date, no official fix is available for CVE-2025-67485. The vendor advisories indicate that the issue is addressed in version 0.4 of mad-proxy, which fixes a related HTTPS interception bypass (CVE-2025-61767). Users are strongly advised to upgrade to v0.4 or later to remain protected [2][3].
- NVD - CVE-2025-67485
- GitHub - machphy/mad-proxy: mad-proxy transparently hijacks HTTP/HTTPS traffic, enforces granular domain-level block/allow logic via YAML, and logs every event for live threat analysis. Built on mitmproxy, it empowers adversary simulation, defensive validation, and real-time policy enforcement directly in the browser kill chain.
- HTTP/HTTPS Traffic Interception Bypass in mad-proxy
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mad-proxyPyPI | <= 0.3 | — |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-wx63-35hw-2482ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-67485ghsaADVISORY
- github.com/machphy/mad-proxy/security/advisories/GHSA-wx63-35hw-2482ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.