Duplicate Advisory: motionEye vulnerable to RCE via unsanitized motion config parameter
        
  High severity
        
          GitHub Reviewed
      
        Published
          Oct 3, 2025 
          to the GitHub Advisory Database
          •
          Updated Nov 3, 2025 
      
  
  
      Withdrawn
      This advisory was withdrawn on Nov 3, 2025
  
    
      Description
        Published by the National Vulnerability Database
      Oct 3, 2025 
    
  
        Published to the GitHub Advisory Database
      Oct 3, 2025 
    
  
        Reviewed
      Nov 3, 2025 
    
  
        Withdrawn
      Nov 3, 2025 
    
  
        Last updated
      Nov 3, 2025 
    
  
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-j945-qm58-4gjx. This link is maintained to preserve external references.
Original Description
MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
References