PT-2025-40457 · Unity Technologies · Unity Runtime
Ryotak
·
Published
2025-06-04
·
Updated
2025-11-20
·
CVE-2025-59489
CVSS v3.1
7.4
7.4
High
| Base vector | Vector | AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Unity versions 2017.1 through 6000.3
Description
A critical vulnerability exists in the Unity Runtime, potentially allowing attackers to execute arbitrary code on systems running applications built with affected versions of the engine. This vulnerability, identified as CVE-2025-59489, stems from an untrusted search path issue, enabling the loading of malicious libraries through crafted command-line arguments. While primarily a local code execution risk, remote exploitation is possible under specific conditions on Android. No known exploits have been reported to date. The vulnerability affects applications built for Android, Windows, macOS, and Linux. Microsoft and Valve have implemented mitigations, and Unity has released patches and a binary patching tool for developers. Approximately 70% of mobile games are estimated to be potentially affected.
Recommendations
Update to the latest patched version of the Unity Editor and rebuild all affected applications. If rebuilding is not feasible, utilize the Unity Application Patcher to address the vulnerability in existing builds, noting that this may conflict with anti-cheat or tamper protection mechanisms. For applications with anti-cheat or tamper protection, rebuilding is required. Ensure automatic updates are enabled for games and applications.
Exploit
Fix
RCE
LPE
Argument Injection
Untrusted Search Path
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-13636
CVE-2025-59489
Affected Products
Unity Runtime
References · 134
- 🔥 https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime · Exploit
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489 · Vendor Advisory
- https://unity.com/security/sept-2025-01 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-13636 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-59489 · Security Note
- https://twitter.com/Insatiatec/status/1978304502055784697 · Twitter Post
- https://twitter.com/secharvesterx/status/1973991591942525306 · Twitter Post
- https://twitter.com/gossy_84/status/1975456080697102736 · Twitter Post
- https://twitter.com/lnxsec/status/1980748439429210540 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1975290967671337168 · Twitter Post
- https://i.redd.it/xba8a537s1tf1.jpeg · Reddit Post
- https://twitter.com/dailytechonx/status/1975705196073287726 · Twitter Post
- https://unity.com/security#security-updates-and-patches · Note
- https://twitter.com/PurpleOps_io/status/1975063595315556547 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1nzl102/major_unity_flaw_microsoft_and_steam_issue_urgent · Reddit Post