LDAP Injection Affecting mitmproxy package, versions [10.1.2, 12.2.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about LDAP Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-MITMPROXY-16033114
  • published14 Apr 2026
  • disclosed14 Apr 2026
  • credityueyueL

Introduced: 14 Apr 2026

NewCVE-2026-40606  (opens in a new tab)
CWE-90  (opens in a new tab)

How to fix?

Upgrade mitmproxy to version 12.2.2 or higher.

Overview

mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.

Affected versions of this package are vulnerable to LDAP Injection through the Ldap authentication handler in mitmproxy/addons/proxyauth.py. An attacker can manipulate the LDAP search filter by supplying a crafted username during proxy authentication, causing the server to query unintended directory entries and accept or reject credentials based on attacker-controlled filter syntax.

Note: Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default.

CVSS Base Scores

version 4.0
version 3.1