CVE-2025-59489

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:2017.1.2p4\+:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:2017.2.0p4\+:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:2017.3.0b9\+:*:*:*:-:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

22 Oct 2025, 18:12

Type Values Removed Values Added
References () https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/ - () https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/ - Exploit, Third Party Advisory
References () https://unity.com/security#security-updates-and-patches - () https://unity.com/security#security-updates-and-patches - Product
References () https://unity.com/security/sept-2025-01 - () https://unity.com/security/sept-2025-01 - Vendor Advisory
First Time Unity editor
Apple macos
Microsoft
Linux linux Kernel
Microsoft windows
Google android
Apple
Linux
Unity
Google
CPE cpe:2.3:a:unity:editor:2017.3.0b9\+:*:*:*:-:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:*
cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:a:unity:editor:2017.2.0p4\+:*:*:*:-:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:unity:editor:2017.1.2p4\+:*:*:*:-:*:*:*

03 Oct 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.4
v2 : unknown
v3 : 7.4
CWE CWE-88
Summary (en) Unity Editor 2019.1 through 6000.3 could allow remote attackers to exploit file loading and Local File Inclusion (LFI) mechanisms via a crafted local application because of an Untrusted Search Path. This could permit unauthorized manipulation of runtime resources and third-party integrations. The issue could affect applications built using Unity and deployed across Android, Windows, macOS, and Linux platforms. (en) Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.

03 Oct 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-03 14:15

Updated : 2025-10-22 18:12


NVD link : CVE-2025-59489

Mitre link : CVE-2025-59489

CVE.ORG link : CVE-2025-59489


JSON object : View

Products Affected

google

  • android

apple

  • macos

unity

  • editor

microsoft

  • windows

linux

  • linux_kernel
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

CWE-426

Untrusted Search Path