PT-2025-40457 · Unity Technologies · Unity Runtime

Ryotak

·

Published

2025-10-03

·

Updated

2025-10-06

·

CVE-2025-59489

CVSS v3.1
7.4
VectorAV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Unity versions 2017.1 and later
Description A significant security vulnerability (CVE-2025-59489) exists in the Unity runtime, potentially allowing arbitrary code execution. This issue stems from an untrusted search path, enabling the loading of malicious code through crafted command-line arguments. While primarily a local code execution risk, remote exploitation is possible under specific conditions on Android. Approximately 70% of mobile games are estimated to be affected. No active exploitation has been reported, but the vulnerability has existed since 2017. The vulnerability affects applications built for Windows, Android, macOS, and Linux. Platforms like iOS, Xbox, and Meta Horizon OS are not affected. API endpoints are not directly involved in the vulnerability, but the issue relates to how Unity handles command-line arguments that can influence file loading.
Recommendations Update to the latest patched Unity Editor version and rebuild projects. If rebuilding is not feasible, use the Unity Application Patcher to patch existing builds. If applications use anti-cheat or tamper protection, rebuilding is required. Ensure automatic updates are enabled for games and applications.

Fix

RCE

LPE

Untrusted Search Path

Argument Injection

Weakness Enumeration

Related Identifiers

CVE-2025-59489

Affected Products

Unity Runtime