OS Command Injection in OpenSSH - CVE-2025-61984

 

OS Command Injection in OpenSSH - CVE-2025-61984

Published: October 10, 2025


Vulnerability identifier: #VU116882
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-61984
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: OpenSSH
Affected software:
OpenSSH

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper validation of control characters in usernames obtained from an untrusted source (such as command line and %-sequence expansion of a configuration file). A remote attacker can trick the victim into initiating an ssh connection using a specially crafted configuration file and execute arbitrary shell commands on the system. 

This vulnerability affects ssh client command and does not affect the sshd daemon. 


How to mitigate CVE-2025-61984

Install updates from vendor's website.

Sources