Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4584-1 | openssh security update |
Ubuntu USN |
USN-8222-1 | OpenSSH vulnerabilities |
Sat, 04 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config. | |
| First Time appeared |
Openbsd
Openbsd openssh |
|
| Weaknesses | CWE-696 | |
| CPEs | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openbsd
Openbsd openssh |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T03:55:45.599Z
Reserved: 2026-04-02T16:44:27.451Z
Link: CVE-2026-35386
Updated: 2026-04-02T17:12:17.154Z
Status : Analyzed
Published: 2026-04-02T17:16:27.623
Modified: 2026-04-27T14:03:07.803
Link: CVE-2026-35386
OpenCVE Enrichment
Updated: 2026-04-07T07:55:58Z
Debian DLA
Ubuntu USN