In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.

Project Subscriptions

Vendors Products
Openbsd Subscribe
Openssh Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Title OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username
Weaknesses CWE-78
References
Metrics threat_severity

None

threat_severity

Low


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
First Time appeared Openbsd
Openbsd openssh
Weaknesses CWE-696
CPEs cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
Vendors & Products Openbsd
Openbsd openssh
References
Metrics cvssV3_1

{'score': 3.6, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T03:55:45.599Z

Reserved: 2026-04-02T16:44:27.451Z

Link: CVE-2026-35386

cve-icon Vulnrichment

Updated: 2026-04-02T17:12:17.154Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T17:16:27.623

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-35386

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-02T16:44:27Z

Links: CVE-2026-35386 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:55:58Z

Weaknesses