You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
HTTP/HTTPS Traffic Interception Bypass in mad-proxy
Moderate severity
GitHub Reviewed
Published
Dec 7, 2025
in
machphy/mad-proxy
•
Updated Dec 9, 2025
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
Learn more on MITRE.
A vulnerability in mad-proxy versions <= 0.3 allows attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic.
References