CVE-2025-60787

HIGH

Remote Code Execution Vulnerability in MotionEye Frontend (CVE-2025-60787)

Title source: metasploit

Description

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

Exploits (8)

github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-60787
nomisec WORKING POC 1 stars
by lil0xplorer · poc
https://github.com/lil0xplorer/CVE-2025-60787_PoC
nomisec WORKING POC
by Rohitberiwala · poc
https://github.com/Rohitberiwala/CVE-2025-60787-MotionEye-RCE
nomisec WORKING POC
by gunzf0x · poc
https://github.com/gunzf0x/CVE-2025-60787
nomisec WRITEUP
by GarethMSheldon · poc
https://github.com/GarethMSheldon/CVE-2025-60787-Detection-motionEye-RCE-via-Config-Injection
github WRITEUP
by prabhatverma47 · poc
https://github.com/prabhatverma47/CVE-2025-60787
exploitdb WORKING POC
by prabhat · textwebappsmultiple
https://www.exploit-db.com/exploits/52481
metasploit WORKING POC EXCELLENT
by Maksim Rogov, prabhatverma47 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/motioneye_auth_rce_cve_2025_60787.rb

Scores

CVSS v3 7.2
EPSS 0.6596
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-78 CWE-20 CWE-116
Status published

Affected Products (6)

motioneye_project/motioneye
motioneye_project/motioneye
motioneye_project/motioneye
motioneye_project/motioneye
motioneye_project/motioneye
pypi/motioneye < 0.43.1b5PyPI

Timeline

Published Oct 03, 2025
Tracked Since Feb 18, 2026