Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wx63-35hw-2482 | HTTP/HTTPS Traffic Interception Bypass in mad-proxy |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mad-proxy
Mad-proxy mad-proxy |
|
| Vendors & Products |
Mad-proxy
Mad-proxy mad-proxy |
Wed, 10 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mad-proxy is a Python-based HTTP/HTTPS proxy server for detection and blocking of malicious web activity using custom security policies. Versions 0.3 and below allow attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic. This issue does not have a fix at the time of publication. | |
| Title | HTTP/HTTPS Traffic Interception Bypass in mad-proxy | |
| Weaknesses | CWE-693 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-10T15:36:44.424Z
Reserved: 2025-12-08T18:02:08.846Z
Link: CVE-2025-67485
Updated: 2025-12-10T15:36:33.964Z
Status : Received
Published: 2025-12-10T01:15:52.137
Modified: 2025-12-10T01:15:52.137
Link: CVE-2025-67485
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:18Z
Github GHSA