CVE-2026-35386
ADVISORY - nistSummary
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
EPSS Score: 0.00028 (0.080)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Incorrect Behavior Order
ADVISORY - redhat
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NIST
CREATED
UPDATED
ADVISORY IDCVE-2026-35386
EXPLOITABILITY SCORE
1
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
3.6lowAlpine
CREATED
UPDATED
ADVISORY IDCVE-2026-35386
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
Debian
CREATED
UPDATED
ADVISORY IDCVE-2026-35386
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
Ubuntu
CREATED
UPDATED
ADVISORY IDCVE-2026-35386
EXPLOITABILITY SCORE
2.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
8.1mediumRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2026-35386
EXPLOITABILITY SCORE
1.0
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
3.6lowPhoton
CREATED
UPDATED
ADVISORY ID
CVE-2026-35386
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-