CVE-2025-61984

Published Oct 6, 2025

Last updated 24 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-61984 is a command injection vulnerability in OpenSSH that allows for remote code execution on a client system. The vulnerability stems from the inadequate filtering of control characters in usernames when the ProxyCommand string is expanded. This occurs when the %r token is used in the ProxyCommand directive within the user's SSH configuration file (~/.ssh/config) to include the remote username. An attacker can inject control characters, such as newline characters, into the username, which can then interrupt the intended `exec` invocation. This interruption allows the attacker to execute arbitrary commands with the privileges of the SSH client. A common attack scenario involves a malicious Git submodule URL. If a user clones a repository with a crafted .gitmodules entry and a matching SSH proxy configuration, the injected control characters trigger the proxy command to execute arbitrary scripts before the SSH connection is established. This vulnerability affects OpenSSH client versions up to and including 10.0p1.

Description
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
Source
cve@mitre.org
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
3.6
Impact score
2.5
Exploitability score
1
Vector string
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Severity
LOW

Weaknesses

cve@mitre.org
CWE-159

Social media

Hype score
Not currently trending
  1. Technical deep-dive: OpenSSH security update for the #SUSE ecosystem. We've analyzed the new patch for CVE-2025-61984 and CVE-2025-61985. Read more: 👉 https://t.co/nQgPUnxAn0 #Security https://t.co/zN9eFCyovG

    @Cezar_H_Linux

    17 Nov 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 📚 OpenSSH ProxyCommand Exploit (CVE-2025-61984) PoC of bash newline attack via SSH ProxyCommand. Read it: https://t.co/fsOiQzYiYl https://t.co/5X7SCeyD2G

    @IntCyberDigest

    27 Oct 2025

    2415 Impressions

    8 Retweets

    25 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  3. 💉 CVE of the Week: Username Injection 💉 CVE-2025-61984 is a Command Injection vulnerability in OpenSSH. When ProxyCommand is used, a crafted username can inject commands, leading to client-side code execution. While it requires a specific client setup, many real environmen

    @vicariusltd

    16 Oct 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. #exploit 1⃣. CVE-2025-32463: LPE to Root via Sudo chroot in Linux - https://t.co/tPtqOQHYJ8 2⃣. CVE-2025-61984: Exploiting SSH via ProxyCommand - https://t.co/2HOWbhgb98 3⃣. CVE-2025-9961: TP-Link CWMP Service RCE - https://t.co/a4Iktctz7h 4⃣. Exploit development for

    @ksg93rd

    15 Oct 2025

    1216 Impressions

    6 Retweets

    15 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

  5. Descubre cómo la CVE-2025-61984 afecta a SSH y qué medidas tomar. Más info aquí: https://t.co/S3ywmE23h8 #Ciberseguridad #SSH

    @AlejosAngel

    13 Oct 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984) https://t.co/s98KcfEVj5

    @jeroldcamacho

    13 Oct 2025

    62 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. OpenSSH Command Injection (CVE-2025-61984). Exploits unsanitized usernames to inject commands via ProxyCommand, leading to remote code execution on vulnerable servers. Patch OpenSSH immediately and sanitize user inputs. #OpenSSHVuln #RCE https://t.co/wJbF073bDG

    @CyberWolfGuard

    9 Oct 2025

    48 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  8. CVE-2025-61984 : Bash a newline - Exploiting SSH via ProxyCommand https://t.co/aWkVjAwnhM https://t.co/zylngBdYvv

    @freedomhack101

    9 Oct 2025

    66 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  9. Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984) https://t.co/C6ERXAPL4K https://t.co/lUi6qGUWku

    @secharvesterx

    8 Oct 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. ⚠️ OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Read more: https://t.co/5i4Hhm67f0 A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on

    @The_Cyber_News

    7 Oct 2025

    29934 Impressions

    129 Retweets

    423 Likes

    208 Bookmarks

    8 Replies

    6 Quotes