CVE-2025-60787

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:motioneye_project:motioneye:0.42.1:*:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta1:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta2:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta3:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta4:*:*:*:*:*:*

History

10 Oct 2025, 16:22

Type Values Removed Values Added
First Time Motioneye Project motioneye
Motioneye Project
CPE cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta2:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.42.1:*:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta3:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta1:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta4:*:*:*:*:*:*
References () http://motioneye-project.com - () http://motioneye-project.com - Broken Link
References () https://github.com/prabhatverma47/motionEye-RCE-through-config-parameter - () https://github.com/prabhatverma47/motionEye-RCE-through-config-parameter - Exploit, Third Party Advisory

03 Oct 2025, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-03 16:16

Updated : 2025-10-10 16:22


NVD link : CVE-2025-60787

Mitre link : CVE-2025-60787

CVE.ORG link : CVE-2025-60787


JSON object : View

Products Affected

motioneye_project

  • motioneye
CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-116

Improper Encoding or Escaping of Output