CVE-2025-61984
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-11-11
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openssh | openssh | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-159 | The product does not properly filter, remove, quote, or otherwise manage the invalid use of special elements in user-controlled input, which could cause adverse effect on its behavior and integrity. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenSSH versions before 10.1, where control characters in usernames from certain possibly untrusted sources (such as the command line and %-sequence expansion in configuration files) can lead to code execution when a ProxyCommand is used. Usernames provided literally in configuration files are not considered untrusted sources.
How can this vulnerability impact me? :
The vulnerability can potentially allow an attacker to execute arbitrary code via specially crafted usernames containing control characters when a ProxyCommand is used in OpenSSH. This could lead to unauthorized actions or compromise of the system where OpenSSH is running.