CVE-2025-60787
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/10/2025
Last modified:
10/10/2025
Description
MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:motioneye_project:motioneye:0.42.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:motioneye_project:motioneye:0.43.1:beta4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



