High severityOSV Advisory· Published May 14, 2025· Updated Apr 15, 2026
CVE-2025-47782
CVE-2025-47782
Description
motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the add/add_camera motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, motion by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
motioneyePyPI | >= 0.43.1b1, < 0.43.1b4 | 0.43.1b4 |
Affected products
1- Range: 0.43.1b1, 0.43.1b2, 0.43.1b3
Patches
2616a5b198f77a9e816550431Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-g5mq-prx7-c588ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-47782ghsaADVISORY
- github.com/motioneye-project/motioneye/issues/3142nvdWEB
- github.com/motioneye-project/motioneye/pull/3143nvdWEB
- github.com/motioneye-project/motioneye/security/advisories/GHSA-g5mq-prx7-c588nvdWEB
- github.com/pypa/advisory-database/tree/main/vulns/motioneye/PYSEC-2025-39.yamlghsaWEB
News mentions
0No linked articles in our index yet.