Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.
References
| Link | Resource |
|---|---|
| https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/ | Exploit Third Party Advisory |
| https://unity.com/security#security-updates-and-patches | Product |
| https://unity.com/security/sept-2025-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
22 Oct 2025, 18:12
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/ - Exploit, Third Party Advisory | |
| References | () https://unity.com/security#security-updates-and-patches - Product | |
| References | () https://unity.com/security/sept-2025-01 - Vendor Advisory | |
| First Time |
Unity editor
Apple macos Microsoft Linux linux Kernel Microsoft windows Google android Apple Linux Unity |
|
| CPE | cpe:2.3:a:unity:editor:2017.3.0b9\+:*:*:*:-:*:*:* cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:unity:editor:2017.2.0p4\+:*:*:*:-:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:unity:editor:2017.1.2p4\+:*:*:*:-:*:*:* |
03 Oct 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
| CWE | CWE-88 | |
| Summary | (en) Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications. |
03 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-03 14:15
Updated : 2025-10-22 18:12
NVD link : CVE-2025-59489
Mitre link : CVE-2025-59489
CVE.ORG link : CVE-2025-59489
JSON object : View
Products Affected
- android
apple
- macos
unity
- editor
microsoft
- windows
linux
- linux_kernel
