CVE-2025-60787

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:motioneye_project:motioneye:0.42.1:*:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta1:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta2:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta3:*:*:*:*:*:*
cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta4:*:*:*:*:*:*

History

No history.

Information

Published : 2025-10-03 16:16

Updated : 2025-10-10 16:22


NVD link : CVE-2025-60787

Mitre link : CVE-2025-60787

CVE.ORG link : CVE-2025-60787


JSON object : View

Products Affected

motioneye_project

  • motioneye
CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-116

Improper Encoding or Escaping of Output