PYSEC-2025-39

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/motioneye/PYSEC-2025-39.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2025-39
Aliases
  • CVE-2025-47782
  • GHSA-g5mq-prx7-c588
Published
2025-05-14T16:15:29Z
Modified
2025-05-14T17:57:10.936625Z
Summary
[none]
Details

motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the add/add_camera motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, motion by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.

References

Affected packages

PyPI / motioneye

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.43.1b1
Fixed
0.43.1b4

Affected versions

0.*

0.43.1b1
0.43.1b2
0.43.1b3