Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4584-1 | openssh security update |
Debian DSA |
DSA-6204-1 | openssh security update |
EUVD |
EUVD-2025-32589 | ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) |
Ubuntu USN |
USN-8090-1 | OpenSSH vulnerabilities |
Ubuntu USN |
USN-8090-2 | OpenSSH vulnerabilities |
Thu, 26 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* |
Tue, 11 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 09 Oct 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | openssh: From CVEorg collector | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openbsd
Openbsd openssh |
|
| Vendors & Products |
Openbsd
Openbsd openssh |
Tue, 07 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Mon, 06 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) | |
| Weaknesses | CWE-159 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-26T17:48:18.755Z
Reserved: 2025-10-06T00:00:00.000Z
Link: CVE-2025-61984
Updated: 2025-11-11T14:50:56.007Z
Status : Deferred
Published: 2025-10-06T19:15:36.157
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-61984
OpenCVE Enrichment
Updated: 2025-10-08T13:39:39Z
Debian DLA
Debian DSA
EUVD
Ubuntu USN