Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Unity Editor 2019.1 through 6000.3 could allow remote attackers to exploit file loading and Local File Inclusion (LFI) mechanisms via a crafted local application because of an Untrusted Search Path. This could permit unauthorized manipulation of runtime resources and third-party integrations. The issue could affect applications built using Unity and deployed across Android, Windows, macOS, and Linux platforms. | Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications. |
Weaknesses | CWE-88 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 03 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-426 | |
Metrics |
cvssV3_1
|
Fri, 03 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Unity Editor 2019.1 through 6000.3 could allow remote attackers to exploit file loading and Local File Inclusion (LFI) mechanisms via a crafted local application because of an Untrusted Search Path. This could permit unauthorized manipulation of runtime resources and third-party integrations. The issue could affect applications built using Unity and deployed across Android, Windows, macOS, and Linux platforms. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-03T17:22:11.001Z
Reserved: 2025-09-16T00:00:00.000Z
Link: CVE-2025-59489

Updated: 2025-10-03T13:55:43.155Z

Status : Received
Published: 2025-10-03T14:15:45.733
Modified: 2025-10-03T18:15:35.860
Link: CVE-2025-59489

No data.

No data.