CVE-2025-60787
HIGHRemote Code Execution Vulnerability in MotionEye Frontend (CVE-2025-60787)
Title source: metasploitDescription
MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
Exploits (8)
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-60787
nomisec
WORKING POC
by Rohitberiwala · poc
https://github.com/Rohitberiwala/CVE-2025-60787-MotionEye-RCE
nomisec
WRITEUP
by GarethMSheldon · poc
https://github.com/GarethMSheldon/CVE-2025-60787-Detection-motionEye-RCE-via-Config-Injection
metasploit
WORKING POC
EXCELLENT
by Maksim Rogov, prabhatverma47 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/motioneye_auth_rce_cve_2025_60787.rb
Scores
CVSS v3
7.2
EPSS
0.6596
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-78
CWE-20
CWE-116
Status
published
Affected Products (6)
motioneye_project/motioneye
motioneye_project/motioneye
motioneye_project/motioneye
motioneye_project/motioneye
motioneye_project/motioneye
pypi/motioneye
< 0.43.1b5PyPI
Timeline
Published
Oct 03, 2025
Tracked Since
Feb 18, 2026