CVE-2026-40606
Published:April 21, 2026
Updated:April 23, 2026
mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.
Affected Packages
https://github.com/mitmproxy/mitmproxy.git (GITHUB):
Affected version(s) >=v0.1 <v12.2.2Fix Suggestion:
Update to version v12.2.2mitmproxy (PYTHON):
Affected version(s) >=0.8 <12.2.2Fix Suggestion:
Update to version 12.2.2mitmproxy (PYTHON):
Affected version(s) >=0.8 <12.2.2Fix Suggestion:
Update to version 12.2.2Related ResourcesĀ (2)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
4.8
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
EPSS
Base Score:
0.03