In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config. | |
| First Time appeared |
Openbsd
Openbsd openssh |
|
| Weaknesses | CWE-696 | |
| CPEs | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openbsd
Openbsd openssh |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-02T18:15:59.616Z
Reserved: 2026-04-02T16:44:27.451Z
Link: CVE-2026-35386
Updated: 2026-04-02T17:12:17.154Z
Status : Received
Published: 2026-04-02T17:16:27.623
Modified: 2026-04-02T17:16:27.623
Link: CVE-2026-35386
No data.
OpenCVE Enrichment
No data.
Weaknesses