In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config. | |
| First Time appeared |
Openbsd
Openbsd openssh |
|
| Weaknesses | CWE-696 | |
| CPEs | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openbsd
Openbsd openssh |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T03:55:45.599Z
Reserved: 2026-04-02T16:44:27.451Z
Link: CVE-2026-35386
Updated: 2026-04-02T17:12:17.154Z
Status : Awaiting Analysis
Published: 2026-04-02T17:16:27.623
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-35386
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:18:26Z