CVE-2025-61984
Severity
3.6LOW
EPSS
0.0%
top 98.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 6
Latest updateMar 12
Description
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 1.0 | Impact: 2.5
Affected Packages2 packages
🔴Vulnerability Details
5📋Vendor Advisories
5Microsoft▶
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrust↗2025-10-14
Red Hat▶
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand↗2025-10-06
Debian▶
CVE-2025-61984: openssh - ssh in OpenSSH before 10.1 allows control characters in usernames that originate...↗2025