Home

Description

mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.

PUBLISHED Reserved 2026-04-14 | Published 2026-04-21 | Updated 2026-04-22 | Assigner GitHub_M




MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')

Product status

< 12.2.2
affected

References

github.com/...mproxy/security/advisories/GHSA-527g-3w9m-29hv

cve.org (CVE-2026-40606)

nvd.nist.gov (CVE-2026-40606)

Download JSON