CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-47782: motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution

8.9 CVSS

Description

motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.

Classification

CVE ID: CVE-2025-47782

CVSS Base Severity: HIGH

CVSS Base Score: 8.9

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem Types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Affected Products

Vendor: motioneye-project

Product: motioneye

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 18.64% (scored less or equal to compared to others)

EPSS Date: 2025-06-12 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-47782
https://github.com/motioneye-project/motioneye/security/advisories/GHSA-g5mq-prx7-c588
https://github.com/motioneye-project/motioneye/issues/3142
https://github.com/motioneye-project/motioneye/pull/3143

Timeline