Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code

Posted on October 7, 2025October 7, 2025 By CWS

A brand new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which might enable an attacker to realize distant code execution on a sufferer’s machine.

The vulnerability is a bypass of a earlier repair for the same concern (CVE-2023-51385) and exploits how the ProxyCommand characteristic interacts with the underlying system shell when dealing with specifically crafted usernames.

The core of the vulnerability lies in OpenSSH’s failure to correctly sanitize management characters, similar to newlines, inside usernames. An attacker can create a username that features a newline character adopted by a malicious command.

This username is then handed to the shell through SSH’s ProxyCommand. Whereas OpenSSH filters many harmful shell metacharacters, it doesn’t filter characters that would power a syntax error in sure shells.

When a shell like Bash, Fish, or csh processes the ProxyCommand, the crafted syntax error on the primary line, the command fails, however the shell doesn’t exit.

As an alternative, it proceeds to execute the command on the subsequent line, which is the malicious payload provided by the attacker. This conduct successfully bypasses safety measures supposed to stop command execution, opening the door for an RCE.

The Git Submodule Assault Vector

Essentially the most sensible exploitation state of affairs for CVE-2025-61984 entails a malicious Git repository. An attacker can configure a submodule inside their repository to make use of a URL containing the malicious, multi-line username.

If a sufferer clones this repository recursively (git clone –recursive), Git will try to attach through SSH to fetch the submodule. This triggers the vulnerability ProxyCommand if the consumer has a particular configuration.

The exploit requires two circumstances on the sufferer’s machine: a shell that continues execution after a syntax error (like Bash) and an SSH configuration file (~/.ssh/config) with a ProxyCommand that makes use of the %r token to incorporate the distant username.

Notably, the safe shell Zsh isn’t susceptible to this method because it terminates upon encountering such errors. Instruments like Teleport have been discovered to generate SSH configurations that use this susceptible sample, doubtlessly rising the assault floor.

Mitigations

The OpenSSH challenge has launched a patch in model 10.1 that totally addresses this vulnerability by disallowing management characters in usernames. All customers are strongly urged to improve to this model or newer.

For methods that can’t be instantly up to date, a number of mitigations may be applied.

Customers can edit their SSH configurations to surround the %r token in single quotes (‘%r’) inside any ProxyCommand directive, which prevents the shell from deciphering the particular characters.

One other efficient defense-in-depth measure is to configure Git to limit the automated use of SSH for submodules.

This vulnerability serves as a vital reminder of the advanced safety dangers that may emerge from the interactions between trusted developer instruments.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Execute, Exploited, OpenSSH, ProxyCommand, Remote, Vulnerability

Post navigation

Previous Post: Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild
Next Post: CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

Related Posts

Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens Cyber Security News
Windows Remote Assistance Vulnerability Allow Attacker to Bypass Security Features Windows Remote Assistance Vulnerability Allow Attacker to Bypass Security Features Cyber Security News
Chinese Hacker Linked to Cyber Espionage Extradited to U.S. Chinese Hacker Linked to Cyber Espionage Extradited to U.S. Cyber Security News
Microsoft Unveils a New Tool to Migrate from Slack to Microsoft Teams Microsoft Unveils a New Tool to Migrate from Slack to Microsoft Teams Cyber Security News
Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files Cyber Security News
New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark