Description
motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
Published: 2025-05-14
Score: 8.9 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14950 motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution
Github GHSA Github GHSA GHSA-g5mq-prx7-c588 motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution
History

Wed, 14 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 May 2025 16:15:00 +0000

Type Values Removed Values Added
Description motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
Title motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Motioneye Project Motioneye
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-05-14T17:36:32.512Z

Reserved: 2025-05-09T19:49:35.620Z

Link: CVE-2025-47782

cve-icon Vulnrichment

Updated: 2025-05-14T17:36:21.073Z

cve-icon NVD

Status : Deferred

Published: 2025-05-14T16:15:29.580

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-47782

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-06-24T09:44:18Z

Weaknesses