PT-2025-40457 · Unity Technologies · Unity Runtime
Ryotak
·
Published
2025-06-04
·
Updated
2026-02-17
·
CVE-2025-59489
CVSS v3.1
7.4
7.4
High
| Base vector | Vector | AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Unity versions 2017.1 through 6000.3
Description
A critical vulnerability exists in the Unity Runtime, affecting applications built with Unity Editor versions 2017.1 and later for Android, Windows, macOS, and Linux. The vulnerability (CVE-2025-59489) allows for arbitrary code execution through argument injection, potentially enabling an attacker to load malicious code from an unintended location. This could allow an adversary to execute code on the machine running the affected application and potentially exfiltrate confidential information. While no active exploitation has been reported, the vulnerability has existed for approximately eight years. The risk is higher on platforms where the application has extensive permissions. The vulnerability is mitigated on iOS, Xbox, and Meta Horizon OS. Microsoft Defender and Steam have implemented protections.
Recommendations
Update to the latest patched version of the Unity Editor and rebuild all affected applications. If rebuilding is not feasible, use the Unity Application Patcher to patch existing builds. If anti-cheat or tamper protection is enabled, rebuilding is required. Ensure automatic updates are enabled for games and applications.
Exploit
Fix
LPE
RCE
Argument Injection
Untrusted Search Path
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-13636
CVE-2025-59489
Affected Products
Unity Runtime
References · 138
- 🔥 https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime · Exploit
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-59489 · Security Note
- https://bdu.fstec.ru/vul/2025-13636 · Security Note
- https://unity.com/security/sept-2025-01 · Vendor Advisory
- https://twitter.com/lnxsec/status/1982379209205977251 · Twitter Post
- https://reddit.com/r/u_GuardingPearSoftware/comments/1nx3ipt/unitys_big_scare_what_you_need_to_know_about · Reddit Post
- https://twitter.com/lnxsec/status/1983126624225607809 · Twitter Post
- https://t.me/avleonovcom/1593 · Telegram Post
- https://twitter.com/TweetThreatNews/status/1975290967671337168 · Twitter Post
- https://twitter.com/lnxsec/status/1982175343449407556 · Twitter Post
- https://twitter.com/Action1corp/status/1978153782891696533 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1od45nf/top_10_trending_cves_22102025 · Reddit Post
- https://twitter.com/transilienceai/status/1980476958333874205 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1nxq0qn/top_10_trending_cves_04102025 · Reddit Post