CVE-2025-60787

HIGH

Remote Code Execution Vulnerability in MotionEye Frontend (CVE-2025-60787)

Title source: metasploit

Description

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

Exploits (10)

exploitdb WORKING POC
by prabhat · textwebappsmultiple
https://www.exploit-db.com/exploits/52481
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-60787
nomisec WORKING POC 1 stars
by lil0xplorer · poc
https://github.com/lil0xplorer/CVE-2025-60787_PoC
nomisec WORKING POC
by agent-skywalker · poc
https://github.com/agent-skywalker/CVE-2025-60787
nomisec WORKING POC
by d3vn0mi · poc
https://github.com/d3vn0mi/CVE-2025-60787-POC
nomisec WORKING POC
by gunzf0x · poc
https://github.com/gunzf0x/CVE-2025-60787
nomisec WORKING POC
by Rohitberiwala · poc
https://github.com/Rohitberiwala/CVE-2025-60787-MotionEye-RCE
nomisec WRITEUP
by GarethMSheldon · poc
https://github.com/GarethMSheldon/CVE-2025-60787-Detection-motionEye-RCE-via-Config-Injection
github WRITEUP
by prabhatverma47 · poc
https://github.com/prabhatverma47/CVE-2025-60787
metasploit WORKING POC EXCELLENT
by Maksim Rogov, prabhatverma47 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/motioneye_auth_rce_cve_2025_60787.rb

Scores

CVSS v3 7.2
EPSS 0.6596
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78 CWE-20 CWE-116
Status published
Products (3)
motioneye_project/motioneye 0.42.1
motioneye_project/motioneye 0.43.1 beta1 (4 CPE variants)
pypi/motioneye 0 - 0.43.1b5PyPI
Published Oct 03, 2025
Tracked Since Feb 18, 2026