Skip to main content

CVE-2025-54081: CWE-428: Unquoted Search Path or Element in LizardByte Sunshine

Medium
VulnerabilityCVE-2025-54081cvecve-2025-54081cwe-428
Published: Tue Sep 23 2025 (09/23/2025, 18:18:39 UTC)
Source: CVE Database V5
Vendor/Project: LizardByte
Product: Sunshine

Description

Sunshine is a self-hosted game stream host for Moonlight. Prior to version 2025.923.33222, the Windows service SunshineService is installed with an unquoted executable path. If Sunshine is installed in a directory whose name includes a space, the Service Control Manager (SCM) interprets the path incrementally and may execute a malicious binary placed earlier in the search string. This issue has been patched in version 2025.923.33222.

AI-Powered Analysis

AILast updated: 09/24/2025, 00:13:09 UTC

Technical Analysis

CVE-2025-54081 is a vulnerability classified under CWE-428 (Unquoted Search Path or Element) affecting the Sunshine software by LizardByte, a self-hosted game streaming server for Moonlight clients. The issue arises from the Windows service 'SunshineService' being installed with an unquoted executable path prior to version 2025.923.33222. When the installation directory path contains spaces and is not enclosed in quotes, the Windows Service Control Manager (SCM) may misinterpret the executable path. This can lead to the SCM searching for executables incrementally along the path segments, potentially executing a malicious binary placed by an attacker in a directory earlier in the search path. This vulnerability allows an attacker with limited privileges (low-level privileges) and requiring user interaction to escalate privileges or execute arbitrary code with the service's permissions. The CVSS v3.1 base score is 6.7, indicating a medium severity level, with a vector showing local attack vector, high attack complexity, low privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability has been patched in version 2025.923.33222, and no known exploits are currently reported in the wild. The root cause is a common Windows service misconfiguration that can be exploited in environments where the software is installed in directories with spaces in their names, such as 'C:\Program Files\Sunshine'.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily in environments where Sunshine is deployed on Windows systems. Given that Sunshine is a niche product used for game streaming, the impact is likely limited to organizations or individuals using this software for remote game streaming or related purposes. However, exploitation could lead to privilege escalation or arbitrary code execution on affected hosts, potentially allowing attackers to gain persistent access or move laterally within a network. This could compromise confidentiality, integrity, and availability of the affected systems. In enterprise environments, especially those with gaming or multimedia development, or where Sunshine is used for remote access, this vulnerability could be leveraged as a foothold for further attacks. The requirement for local access and user interaction reduces the risk of widespread remote exploitation but does not eliminate the threat in scenarios where attackers have some level of access or can trick users into executing malicious binaries. The medium severity rating reflects these factors. Organizations with strict endpoint security and controlled software installation paths are less likely to be impacted, but those with less stringent controls or legacy installations may be vulnerable.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately update Sunshine to version 2025.923.33222 or later, where the unquoted path issue is fixed. 2) Audit existing installations to verify the installation path does not contain spaces or ensure the executable path is properly quoted in the service configuration. 3) Use Windows tools such as 'sc qc SunshineService' to check the service executable path and correct it if unquoted. 4) Restrict write permissions on directories in the executable path to prevent unauthorized users from placing malicious binaries. 5) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized executable files. 6) Educate users about the risks of executing unknown binaries and enforce least privilege principles to limit the ability of attackers to exploit local vulnerabilities. 7) Monitor logs for unusual service behavior or unexpected process executions related to SunshineService. These steps go beyond generic patching by addressing the root cause and reducing the attack surface related to service path misconfigurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T13:22:18.207Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d336ad712f26b964ce8eae

Added to database: 9/24/2025, 12:09:17 AM

Last enriched: 9/24/2025, 12:13:09 AM

Last updated: 9/27/2025, 2:08:36 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats