CVE-2025-54081: CWE-428: Unquoted Search Path or Element in LizardByte Sunshine
Sunshine is a self-hosted game stream host for Moonlight. Prior to version 2025.923.33222, the Windows service SunshineService is installed with an unquoted executable path. If Sunshine is installed in a directory whose name includes a space, the Service Control Manager (SCM) interprets the path incrementally and may execute a malicious binary placed earlier in the search string. This issue has been patched in version 2025.923.33222.
AI Analysis
Technical Summary
CVE-2025-54081 is a vulnerability classified under CWE-428 (Unquoted Search Path or Element) affecting the Sunshine software by LizardByte, a self-hosted game streaming server for Moonlight clients. The issue arises from the Windows service 'SunshineService' being installed with an unquoted executable path prior to version 2025.923.33222. When the installation directory path contains spaces and is not enclosed in quotes, the Windows Service Control Manager (SCM) may misinterpret the executable path. This can lead to the SCM searching for executables incrementally along the path segments, potentially executing a malicious binary placed by an attacker in a directory earlier in the search path. This vulnerability allows an attacker with limited privileges (low-level privileges) and requiring user interaction to escalate privileges or execute arbitrary code with the service's permissions. The CVSS v3.1 base score is 6.7, indicating a medium severity level, with a vector showing local attack vector, high attack complexity, low privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability has been patched in version 2025.923.33222, and no known exploits are currently reported in the wild. The root cause is a common Windows service misconfiguration that can be exploited in environments where the software is installed in directories with spaces in their names, such as 'C:\Program Files\Sunshine'.
Potential Impact
For European organizations, this vulnerability presents a moderate risk primarily in environments where Sunshine is deployed on Windows systems. Given that Sunshine is a niche product used for game streaming, the impact is likely limited to organizations or individuals using this software for remote game streaming or related purposes. However, exploitation could lead to privilege escalation or arbitrary code execution on affected hosts, potentially allowing attackers to gain persistent access or move laterally within a network. This could compromise confidentiality, integrity, and availability of the affected systems. In enterprise environments, especially those with gaming or multimedia development, or where Sunshine is used for remote access, this vulnerability could be leveraged as a foothold for further attacks. The requirement for local access and user interaction reduces the risk of widespread remote exploitation but does not eliminate the threat in scenarios where attackers have some level of access or can trick users into executing malicious binaries. The medium severity rating reflects these factors. Organizations with strict endpoint security and controlled software installation paths are less likely to be impacted, but those with less stringent controls or legacy installations may be vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update Sunshine to version 2025.923.33222 or later, where the unquoted path issue is fixed. 2) Audit existing installations to verify the installation path does not contain spaces or ensure the executable path is properly quoted in the service configuration. 3) Use Windows tools such as 'sc qc SunshineService' to check the service executable path and correct it if unquoted. 4) Restrict write permissions on directories in the executable path to prevent unauthorized users from placing malicious binaries. 5) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized executable files. 6) Educate users about the risks of executing unknown binaries and enforce least privilege principles to limit the ability of attackers to exploit local vulnerabilities. 7) Monitor logs for unusual service behavior or unexpected process executions related to SunshineService. These steps go beyond generic patching by addressing the root cause and reducing the attack surface related to service path misconfigurations.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2025-54081: CWE-428: Unquoted Search Path or Element in LizardByte Sunshine
Description
Sunshine is a self-hosted game stream host for Moonlight. Prior to version 2025.923.33222, the Windows service SunshineService is installed with an unquoted executable path. If Sunshine is installed in a directory whose name includes a space, the Service Control Manager (SCM) interprets the path incrementally and may execute a malicious binary placed earlier in the search string. This issue has been patched in version 2025.923.33222.
AI-Powered Analysis
Technical Analysis
CVE-2025-54081 is a vulnerability classified under CWE-428 (Unquoted Search Path or Element) affecting the Sunshine software by LizardByte, a self-hosted game streaming server for Moonlight clients. The issue arises from the Windows service 'SunshineService' being installed with an unquoted executable path prior to version 2025.923.33222. When the installation directory path contains spaces and is not enclosed in quotes, the Windows Service Control Manager (SCM) may misinterpret the executable path. This can lead to the SCM searching for executables incrementally along the path segments, potentially executing a malicious binary placed by an attacker in a directory earlier in the search path. This vulnerability allows an attacker with limited privileges (low-level privileges) and requiring user interaction to escalate privileges or execute arbitrary code with the service's permissions. The CVSS v3.1 base score is 6.7, indicating a medium severity level, with a vector showing local attack vector, high attack complexity, low privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability has been patched in version 2025.923.33222, and no known exploits are currently reported in the wild. The root cause is a common Windows service misconfiguration that can be exploited in environments where the software is installed in directories with spaces in their names, such as 'C:\Program Files\Sunshine'.
Potential Impact
For European organizations, this vulnerability presents a moderate risk primarily in environments where Sunshine is deployed on Windows systems. Given that Sunshine is a niche product used for game streaming, the impact is likely limited to organizations or individuals using this software for remote game streaming or related purposes. However, exploitation could lead to privilege escalation or arbitrary code execution on affected hosts, potentially allowing attackers to gain persistent access or move laterally within a network. This could compromise confidentiality, integrity, and availability of the affected systems. In enterprise environments, especially those with gaming or multimedia development, or where Sunshine is used for remote access, this vulnerability could be leveraged as a foothold for further attacks. The requirement for local access and user interaction reduces the risk of widespread remote exploitation but does not eliminate the threat in scenarios where attackers have some level of access or can trick users into executing malicious binaries. The medium severity rating reflects these factors. Organizations with strict endpoint security and controlled software installation paths are less likely to be impacted, but those with less stringent controls or legacy installations may be vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update Sunshine to version 2025.923.33222 or later, where the unquoted path issue is fixed. 2) Audit existing installations to verify the installation path does not contain spaces or ensure the executable path is properly quoted in the service configuration. 3) Use Windows tools such as 'sc qc SunshineService' to check the service executable path and correct it if unquoted. 4) Restrict write permissions on directories in the executable path to prevent unauthorized users from placing malicious binaries. 5) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized executable files. 6) Educate users about the risks of executing unknown binaries and enforce least privilege principles to limit the ability of attackers to exploit local vulnerabilities. 7) Monitor logs for unusual service behavior or unexpected process executions related to SunshineService. These steps go beyond generic patching by addressing the root cause and reducing the attack surface related to service path misconfigurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T13:22:18.207Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d336ad712f26b964ce8eae
Added to database: 9/24/2025, 12:09:17 AM
Last enriched: 9/24/2025, 12:13:09 AM
Last updated: 9/27/2025, 2:08:36 AM
Views: 15
Related Threats
CVE-2025-9816: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in veronalabs WP Statistics – Simple, privacy-friendly Google Analytics alternative
HighCVE-2025-11050: Improper Authorization in Portabilis i-Educar
MediumCVE-2025-10499: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-10498: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-8440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in spwebguy Team Members
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.