Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code

Posted on October 7, 2025October 7, 2025 By CWS

A brand new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which might enable an attacker to realize distant code execution on a sufferer’s machine.

The vulnerability is a bypass of a earlier repair for the same concern (CVE-2023-51385) and exploits how the ProxyCommand characteristic interacts with the underlying system shell when dealing with specifically crafted usernames.

The core of the vulnerability lies in OpenSSH’s failure to correctly sanitize management characters, similar to newlines, inside usernames. An attacker can create a username that features a newline character adopted by a malicious command.

This username is then handed to the shell through SSH’s ProxyCommand. Whereas OpenSSH filters many harmful shell metacharacters, it doesn’t filter characters that would power a syntax error in sure shells.

When a shell like Bash, Fish, or csh processes the ProxyCommand, the crafted syntax error on the primary line, the command fails, however the shell doesn’t exit.

As an alternative, it proceeds to execute the command on the subsequent line, which is the malicious payload provided by the attacker. This conduct successfully bypasses safety measures supposed to stop command execution, opening the door for an RCE.

The Git Submodule Assault Vector

Essentially the most sensible exploitation state of affairs for CVE-2025-61984 entails a malicious Git repository. An attacker can configure a submodule inside their repository to make use of a URL containing the malicious, multi-line username.

If a sufferer clones this repository recursively (git clone –recursive), Git will try to attach through SSH to fetch the submodule. This triggers the vulnerability ProxyCommand if the consumer has a particular configuration.

The exploit requires two circumstances on the sufferer’s machine: a shell that continues execution after a syntax error (like Bash) and an SSH configuration file (~/.ssh/config) with a ProxyCommand that makes use of the %r token to incorporate the distant username.

Notably, the safe shell Zsh isn’t susceptible to this method because it terminates upon encountering such errors. Instruments like Teleport have been discovered to generate SSH configurations that use this susceptible sample, doubtlessly rising the assault floor.

Mitigations

The OpenSSH challenge has launched a patch in model 10.1 that totally addresses this vulnerability by disallowing management characters in usernames. All customers are strongly urged to improve to this model or newer.

For methods that can’t be instantly up to date, a number of mitigations may be applied.

Customers can edit their SSH configurations to surround the %r token in single quotes (‘%r’) inside any ProxyCommand directive, which prevents the shell from deciphering the particular characters.

One other efficient defense-in-depth measure is to configure Git to limit the automated use of SSH for submodules.

This vulnerability serves as a vital reminder of the advanced safety dangers that may emerge from the interactions between trusted developer instruments.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Execute, Exploited, OpenSSH, ProxyCommand, Remote, Vulnerability

Post navigation

Previous Post: Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild
Next Post: CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

Related Posts

ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses Cyber Security News
SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network Cyber Security News
Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Cyber Security News
Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access Cyber Security News
NX Build Tool Hacked with Malware That Checks for Claude or Gemini to Find Wallets and Secrets Cyber Security News
HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News