VYPR
High severityNVD Advisory· Published Oct 3, 2025· Updated Oct 3, 2025

CVE-2025-60787

CVE-2025-60787

Description

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MotionEye v0.43.1b4 and earlier suffers from OS command injection via unsanitized config fields, allowing authenticated admin users to execute arbitrary commands when Motion restarts.

Vulnerability

Overview

MotionEye v0.43.1b4 and earlier contains an OS command injection vulnerability in configuration parameters such as image_file_name and movie_filename. The application writes user-supplied values directly into Motion configuration files without sanitization, allowing shell metacharacters (e.g., $(), backticks) to be interpreted when the Motion service restarts [1][3].

Exploitation

An attacker with admin access to the MotionEye web UI can bypass client-side validation (as demonstrated in a public proof-of-concept [2]) and inject arbitrary commands into these fields. The malicious input is stored in /etc/motioneye/camera-*.conf. When MotionEye restarts the Motion daemon (via motionctl.restart), the injected commands are executed with the privileges of the Motion process [3].

Impact

Successful exploitation grants remote code execution within the MotionEye container. Depending on container privileges, this could lead to host compromise. The vulnerability affects all versions up to and including 0.43.1b4. As of the advisory date, no official patch is available; a workaround involves restricting admin access and implementing additional input validation [2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
motioneyePyPI
< 0.43.1b50.43.1b5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.