CVE-2025-59489

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.
Argument Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
7.4 HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
8.4 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 1%
VendorProductVersion
unityeditor
2017.4 ≤
𝑥
≤ 2018.4
unityeditor
2019.1 ≤
𝑥
< 2019.1.15f1
unityeditor
2019.2 ≤
𝑥
< 2019.2.23f1
unityeditor
2019.3 ≤
𝑥
≤ 2019.3.17f1
unityeditor
2019.4 ≤
𝑥
< 2019.4.41f1
unityeditor
2020.1 ≤
𝑥
< 2020.1.18f1
unityeditor
2020.2 ≤
𝑥
< 2020.2.8f1
unityeditor
2020.3 ≤
𝑥
< 2020.3.49f1
unityeditor
2021.1 ≤
𝑥
< 2021.1.29f1
unityeditor
2021.2 ≤
𝑥
< 2021.2.20f1
unityeditor
2021.3 ≤
𝑥
< 2021.3.45f2
unityeditor
2022.1 ≤
𝑥
< 2022.1.25f1
unityeditor
2022.2 ≤
𝑥
< 2022.2.23f1
unityeditor
2022.3 ≤
𝑥
< 2022.3.62f2
unityeditor
2023.1 ≤
𝑥
< 2023.1.22f1
unityeditor
2023.2 ≤
𝑥
< 2023.2.22f1
unityeditor
6000.0 ≤
𝑥
< 6000.0.58f2
unityeditor
6000.1 ≤
𝑥
< 6000.1.17f1
unityeditor
6000.2 ≤
𝑥
< 6000.2.6f2
unityeditor
6000.3 ≤
𝑥
< 6000.3.0b4
unityeditor
2017.1.2p4\+:p4
unityeditor
2017.2.0p4\+:p4
unityeditor
2017.3.0b9\+:b9
𝑥
= Vulnerable software versions