CVE-2025-59489

HIGH

Unity Runtime <2025-10-02 - Code Injection

Title source: llm

Description

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.

Exploits (2)

github WORKING POC 36 stars
by GithubKillsMyOpsec · javapoc
https://github.com/GithubKillsMyOpsec/CVE-2025-59489-POC
github SCANNER 13 stars
by taptap · pythonpoc
https://github.com/taptap/cve-2025-59489

Scores

CVSS v3 7.4
EPSS 0.0001
EPSS Percentile 1.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-88 CWE-426
Status published

Affected Products (5)

unity/editor < 2018.4
unity/editor < 2019.4.41f1
unity/editor
unity/editor
unity/editor

Timeline

Published Oct 03, 2025
Tracked Since Feb 18, 2026