CVE-2025-60787
Description
MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MotionEye v0.43.1b4 and earlier suffers from OS command injection via unsanitized config fields, allowing authenticated admin users to execute arbitrary commands when Motion restarts.
Vulnerability
Overview
MotionEye v0.43.1b4 and earlier contains an OS command injection vulnerability in configuration parameters such as image_file_name and movie_filename. The application writes user-supplied values directly into Motion configuration files without sanitization, allowing shell metacharacters (e.g., $(), backticks) to be interpreted when the Motion service restarts [1][3].
Exploitation
An attacker with admin access to the MotionEye web UI can bypass client-side validation (as demonstrated in a public proof-of-concept [2]) and inject arbitrary commands into these fields. The malicious input is stored in /etc/motioneye/camera-*.conf. When MotionEye restarts the Motion daemon (via motionctl.restart), the injected commands are executed with the privileges of the Motion process [3].
Impact
Successful exploitation grants remote code execution within the MotionEye container. Depending on container privileges, this could lead to host compromise. The vulnerability affects all versions up to and including 0.43.1b4. As of the advisory date, no official patch is available; a workaround involves restricting admin access and implementing additional input validation [2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
motioneyePyPI | < 0.43.1b5 | 0.43.1b5 |
Affected products
2- MotionEye/MotionEyedescription
- Range: <=0.43.1b4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.