HomeUnityCVE-2025-59489

CVE-2025-59489

HIGH
7.4CVSS
Published: 2025-10-03
Updated: 2025-10-22
AI Analysis

Description

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-88CWE-426

Metadata

Primary Vendor
UNITY
Published
10/3/2025
Last Modified
10/22/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

unity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editorunity : editor

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief