mad-proxy is a Python-based HTTP/HTTPS proxy server for detection and blocking of malicious web activity using custom security policies. Versions 0.3 and below allow attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic. This issue does not have a fix at the time of publication.
References
| Link | Resource |
|---|---|
| https://github.com/machphy/mad-proxy/security/advisories/GHSA-wx63-35hw-2482 | Vendor Advisory |
Configurations
History
09 Mar 2026, 13:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Machphy
Machphy mad-proxy |
|
| CPE | cpe:2.3:a:machphy:mad-proxy:*:*:*:*:*:python:*:* | |
| References | () https://github.com/machphy/mad-proxy/security/advisories/GHSA-wx63-35hw-2482 - Vendor Advisory |
10 Dec 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 01:15
Updated : 2026-03-09 13:37
NVD link : CVE-2025-67485
Mitre link : CVE-2025-67485
CVE.ORG link : CVE-2025-67485
JSON object : View
Products Affected
machphy
- mad-proxy
CWE
CWE-693
Protection Mechanism Failure
