AI description
CVE-2025-61984 is a command injection vulnerability in OpenSSH that allows for remote code execution on a client system. The vulnerability stems from the inadequate filtering of control characters in usernames when the ProxyCommand string is expanded. This occurs when the %r token is used in the ProxyCommand directive within the user's SSH configuration file (~/.ssh/config) to include the remote username. An attacker can inject control characters, such as newline characters, into the username, which can then interrupt the intended `exec` invocation. This interruption allows the attacker to execute arbitrary commands with the privileges of the SSH client. A common attack scenario involves a malicious Git submodule URL. If a user clones a repository with a crafted .gitmodules entry and a matching SSH proxy configuration, the injected control characters trigger the proxy command to execute arbitrary scripts before the SSH connection is established. This vulnerability affects OpenSSH client versions up to and including 10.0p1.
- Description
- ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 3.6
- Impact score
- 2.5
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
- Severity
- LOW
- cve@mitre.org
- CWE-159
- Hype score
- Not currently trending
Technical deep-dive: OpenSSH security update for the #SUSE ecosystem. We've analyzed the new patch for CVE-2025-61984 and CVE-2025-61985. Read more: 👉 https://t.co/nQgPUnxAn0 #Security https://t.co/zN9eFCyovG
@Cezar_H_Linux
17 Nov 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📚 OpenSSH ProxyCommand Exploit (CVE-2025-61984) PoC of bash newline attack via SSH ProxyCommand. Read it: https://t.co/fsOiQzYiYl https://t.co/5X7SCeyD2G
@IntCyberDigest
27 Oct 2025
2415 Impressions
8 Retweets
25 Likes
4 Bookmarks
0 Replies
0 Quotes
💉 CVE of the Week: Username Injection 💉 CVE-2025-61984 is a Command Injection vulnerability in OpenSSH. When ProxyCommand is used, a crafted username can inject commands, leading to client-side code execution. While it requires a specific client setup, many real environmen
@vicariusltd
16 Oct 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1⃣. CVE-2025-32463: LPE to Root via Sudo chroot in Linux - https://t.co/tPtqOQHYJ8 2⃣. CVE-2025-61984: Exploiting SSH via ProxyCommand - https://t.co/2HOWbhgb98 3⃣. CVE-2025-9961: TP-Link CWMP Service RCE - https://t.co/a4Iktctz7h 4⃣. Exploit development for
@ksg93rd
15 Oct 2025
1216 Impressions
6 Retweets
15 Likes
7 Bookmarks
0 Replies
0 Quotes
Descubre cómo la CVE-2025-61984 afecta a SSH y qué medidas tomar. Más info aquí: https://t.co/S3ywmE23h8 #Ciberseguridad #SSH
@AlejosAngel
13 Oct 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984) https://t.co/s98KcfEVj5
@jeroldcamacho
13 Oct 2025
62 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
OpenSSH Command Injection (CVE-2025-61984). Exploits unsanitized usernames to inject commands via ProxyCommand, leading to remote code execution on vulnerable servers. Patch OpenSSH immediately and sanitize user inputs. #OpenSSHVuln #RCE https://t.co/wJbF073bDG
@CyberWolfGuard
9 Oct 2025
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-61984 : Bash a newline - Exploiting SSH via ProxyCommand https://t.co/aWkVjAwnhM https://t.co/zylngBdYvv
@freedomhack101
9 Oct 2025
66 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984) https://t.co/C6ERXAPL4K https://t.co/lUi6qGUWku
@secharvesterx
8 Oct 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Read more: https://t.co/5i4Hhm67f0 A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on
@The_Cyber_News
7 Oct 2025
29934 Impressions
129 Retweets
423 Likes
208 Bookmarks
8 Replies
6 Quotes