Unrated severityNVD Advisory· Published May 22, 2026
Sunshine: Authentication bypass via improper client certificate validation
CVE-2026-32253
Description
Sunshine is a self-hosted game stream host for Moonlight. In versions prior to 2026.516.143833, the client-certificate authentication can be bypassed because of how OpenSSL verification results are handled. In src/crypto.cpp, the custom verify callback treats X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, X509_V_ERR_CERT_NOT_YET_VALID, and X509_V_ERR_CERT_HAS_EXPIRED as success. This can allow an untrusted certificate to pass authentication and access protected HTTPS endpoints. This issue has been fixed in version 2026.516.143833.
Affected products
1- Range: <2026.516.143833
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/LizardByte/Sunshine/releases/tag/v2026.516.143833mitrex_refsource_MISC
- github.com/LizardByte/Sunshine/security/advisories/GHSA-ph75-mgxh-mv57mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.