Duplicate Advisory: motionEye vulnerable to RCE via unsanitized motion config parameter
High severity
GitHub Reviewed
Published
Oct 3, 2025
to the GitHub Advisory Database
•
Updated Nov 3, 2025
Withdrawn
This advisory was withdrawn on Nov 3, 2025
Description
Published by the National Vulnerability Database
Oct 3, 2025
Published to the GitHub Advisory Database
Oct 3, 2025
Reviewed
Nov 3, 2025
Withdrawn
Nov 3, 2025
Last updated
Nov 3, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-j945-qm58-4gjx. This link is maintained to preserve external references.
Original Description
MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
References