CVE-2025-61984
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-06

Last updated on: 2025-11-11

Assigner: MITRE

Description
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-06
Last Modified
2025-11-11
Generated
2026-05-07
AI Q&A
2025-10-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openssh openssh *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-159 The product does not properly filter, remove, quote, or otherwise manage the invalid use of special elements in user-controlled input, which could cause adverse effect on its behavior and integrity.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenSSH versions before 10.1, where control characters in usernames from certain possibly untrusted sources (such as the command line and %-sequence expansion in configuration files) can lead to code execution when a ProxyCommand is used. Usernames provided literally in configuration files are not considered untrusted sources.


How can this vulnerability impact me? :

The vulnerability can potentially allow an attacker to execute arbitrary code via specially crafted usernames containing control characters when a ProxyCommand is used in OpenSSH. This could lead to unauthorized actions or compromise of the system where OpenSSH is running.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart