Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code

Posted on October 7, 2025October 7, 2025 By CWS

A brand new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which might enable an attacker to realize distant code execution on a sufferer’s machine.

The vulnerability is a bypass of a earlier repair for the same concern (CVE-2023-51385) and exploits how the ProxyCommand characteristic interacts with the underlying system shell when dealing with specifically crafted usernames.

The core of the vulnerability lies in OpenSSH’s failure to correctly sanitize management characters, similar to newlines, inside usernames. An attacker can create a username that features a newline character adopted by a malicious command.

This username is then handed to the shell through SSH’s ProxyCommand. Whereas OpenSSH filters many harmful shell metacharacters, it doesn’t filter characters that would power a syntax error in sure shells.

When a shell like Bash, Fish, or csh processes the ProxyCommand, the crafted syntax error on the primary line, the command fails, however the shell doesn’t exit.

As an alternative, it proceeds to execute the command on the subsequent line, which is the malicious payload provided by the attacker. This conduct successfully bypasses safety measures supposed to stop command execution, opening the door for an RCE.

The Git Submodule Assault Vector

Essentially the most sensible exploitation state of affairs for CVE-2025-61984 entails a malicious Git repository. An attacker can configure a submodule inside their repository to make use of a URL containing the malicious, multi-line username.

If a sufferer clones this repository recursively (git clone –recursive), Git will try to attach through SSH to fetch the submodule. This triggers the vulnerability ProxyCommand if the consumer has a particular configuration.

The exploit requires two circumstances on the sufferer’s machine: a shell that continues execution after a syntax error (like Bash) and an SSH configuration file (~/.ssh/config) with a ProxyCommand that makes use of the %r token to incorporate the distant username.

Notably, the safe shell Zsh isn’t susceptible to this method because it terminates upon encountering such errors. Instruments like Teleport have been discovered to generate SSH configurations that use this susceptible sample, doubtlessly rising the assault floor.

Mitigations

The OpenSSH challenge has launched a patch in model 10.1 that totally addresses this vulnerability by disallowing management characters in usernames. All customers are strongly urged to improve to this model or newer.

For methods that can’t be instantly up to date, a number of mitigations may be applied.

Customers can edit their SSH configurations to surround the %r token in single quotes (‘%r’) inside any ProxyCommand directive, which prevents the shell from deciphering the particular characters.

One other efficient defense-in-depth measure is to configure Git to limit the automated use of SSH for submodules.

This vulnerability serves as a vital reminder of the advanced safety dangers that may emerge from the interactions between trusted developer instruments.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Execute, Exploited, OpenSSH, ProxyCommand, Remote, Vulnerability

Post navigation

Previous Post: Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild
Next Post: CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

Related Posts

Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Cyber Security News
Google Announces 10 New AI Features for Google Chrome Powered by Gemini Cyber Security News
McLaren Health Care Data Breach Exposes 743,000 People Personal Information Cyber Security News
FreeBSD-based OPNsense firewall Released for Security Issues and Improvements Cyber Security News
Fortra GoAnywhere Vulnerability Exploited as 0-day Before Patch Released Cyber Security News
Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark