Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Application-wide CSRF in the UI leads to command injection as Administrator

Critical
ReenigneArcher published GHSA-39hj-fxvw-758m Jun 30, 2025

Package

Sunshine

Affected versions

<=2025.122.141614

Patched versions

2025.628.4510

Description

Summary

The web UI of Sunshine lacks protection against Cross-Site Request Forgery (CSRF) attacks. This vulnerability allows an attacker to craft a malicious web page that, when visited by an authenticated user, can trigger unintended actions within the Sunshine application on behalf of that user.

Specifically, since the application does OS command execution by design, this issue can be exploited to abuse the "Command Preparations" feature, enabling an attacker to inject arbitrary commands that will be executed with Administrator privileges when an application is launched.

Details

The application uses Basic Authentication, which is inherently vulnerable to Cross-Site Request Forgery (CSRF) attacks. Once a user is authenticated, the browser includes the "Authorization: Basic ..." header in all subsequent requests, including cross-origin requests. This behavior allows attackers to craft malicious forms on their own websites that, when visited by an authenticated user, can trigger unauthorized actions within the Sunshine application.

Impact

An attacker is able to perform command injection as Administrator on the machine running Sunshine. This vulnerability is particularly impactful, as the CSRF can be triggered over the internet without an exposed Sunshine instance.
The PoC is built for command injection but an attacker could also build a form to pair a new device, or perform any action available in the application.

Fix

The bug was patched by 738ac93.

Severity

Critical

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CVE ID

CVE-2025-53095

Weaknesses

Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. Learn more on MITRE.

Credits