CVE-2025-61984

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
Configurations

No configuration.

History

11 Nov 2025, 15:15

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/cve-2025-61984-detection-script-remote-code-execution-vulnerability-affecting-openssh -
  • () https://www.vicarius.io/vsociety/posts/cve-2025-61984-mitigation-script-remote-code-execution-vulnerability-affecting-openssh -

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/10/07/1 -
  • () http://www.openwall.com/lists/oss-security/2025/10/12/1 -

Information

Published : 2025-10-06 19:15

Updated : 2025-11-11 15:15


NVD link : CVE-2025-61984

Mitre link : CVE-2025-61984

CVE.ORG link : CVE-2025-61984


JSON object : View

Products Affected

No product.

CWE
CWE-159

Improper Handling of Invalid Use of Special Elements