OpenSSH 10.1-Prev: Username Ctrl Char Enables Code Exec via ProxyCommand
CVE-2025-61984 Published on October 6, 2025

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

NVD

Weakness Type

Improper Handling of Invalid Use of Special Elements

The product does not properly filter, remove, quote, or otherwise manage the invalid use of special elements in user-controlled input, which could cause adverse effect on its behavior and integrity.


Products Associated with CVE-2025-61984

stack.watch emails you whenever new vulnerabilities are published in OpenBSD OpenSSH or Canonical Ubuntu Linux. Just hit a watch button to start following.

 
 

Affected Versions

OpenBSD OpenSSH:

Exploit Probability

EPSS
0.01%
Percentile
0.22%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.