Medium severity4.8NVD Advisory· Published Apr 21, 2026· Updated Apr 24, 2026
CVE-2026-40606
CVE-2026-40606
Description
mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mitmproxyPyPI | < 12.2.2 | 12.2.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-527g-3w9m-29hvghsaADVISORY
- github.com/mitmproxy/mitmproxy/security/advisories/GHSA-527g-3w9m-29hvnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-40606ghsaADVISORY
News mentions
0No linked articles in our index yet.