OpenSSH before 10.1 Null Byte in ssh:// URI ProxyCommand Code Execution
CVE-2025-61985 Published on October 6, 2025

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

NVD

Weakness Type

Improper Neutralization of Null Byte or NUL Character

The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes NUL characters or null bytes when they are sent to a downstream component. As data is parsed, an injected NUL character or null byte may cause the software to believe the input is terminated earlier than it actually is, or otherwise cause the input to be misinterpreted. This could then be used to inject potentially dangerous input that occurs after the null byte or otherwise bypass validation routines and other protection mechanisms.


Products Associated with CVE-2025-61985

stack.watch emails you whenever new vulnerabilities are published in OpenBSD OpenSSH or Canonical Ubuntu Linux. Just hit a watch button to start following.

 
 

Affected Versions

OpenBSD OpenSSH:

Exploit Probability

EPSS
0.01%
Percentile
0.72%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.