DNA View

CVE-2025-61984

Low
Low Medium High Critical
3.6
CVSS Score
Published: Oct 06, 2025
Last Modified: Nov 11, 2025

Vulnerability Description

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack Vector
L
Attack Complexity
H
Privileges Required
L
User Interaction
N
Scope
U
Confidentiality
L
Integrity
L
Availability
N

Available Security Patches

5 patches available from vendors

View All Patches
Oracle

CPUAPR2026

Oracle Critical Patch Update Advisory - April 2026

Severity
Critical
Released
Apr 21, 2026
Restart Required
Security Update
Canonical (Ubuntu)

USN-8090-2

USN-8090-2: OpenSSH vulnerabilities

Severity
Unknown
Released
Mar 12, 2026
Security Update
Canonical (Ubuntu)

USN-8090-1

USN-8090-1: OpenSSH vulnerabilities

Severity
Unknown
Released
Mar 12, 2026
Security Update
Microsoft

2025-Oct-CVE-2025-61984

CVE-2025-61984: ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Severity
Unknown
Released
Nov 21, 2025
Security Update
SUSE

CVE-2025-61984

CVE-2025-61984

Severity
Unknown
Released
Nov 02, 2025
Security Update

Severity Details

3.6
out of 10.0
Low

Weakness Type (CWE)

CWE-159

Improper Handling of Invalid Use of Special Elements

Description
The product does not properly filter, remove, quote, or otherwise manage the invalid use of special elements in user-controlled input, which could cause adverse effect on its behavior and integrity.
Typical Severity
Medium
Abstraction Level
Class

Key Information

Published Date
October 06, 2025