Impact
The vulnerability in Sunshine allows an attacker to bypass client- certificate authentication by exploiting a flawed OpenSSL verification callback that treats several certificate errors as success. The flaw can let an untrusted or rogue certificate pass validation and grant access to protected HTTPS endpoints, potentially exposing sensitive data or enabling further compromise of the host server.
Affected Systems
All deployed instances of LizardByte Sunshine that are running versions older than v2026.516.143833, the self‑hosted game‑stream server that serves Moonlight clients.
Risk and Exploitability
The issue carries a CVSS score of 9.8, indicating a very high impact if exploited. No EPSS score is currently available, but the vulnerability is not listed in the CISA KEV catalog. An attacker can remotely connect to the Sunshine HTTPS service with a crafted client certificate; because the server inadvertently accepts the certificate, the attacker can authenticate and exercise full control of the restricted endpoints. The vulnerability remains exploitable until the software is updated to v2026.516.143833 or later, where proper certificate validation is restored.
OpenCVE Enrichment