Search criteria
3 vulnerabilities by unity
CVE-2025-59489 (GCVE-0-2025-59489)
Vulnerability from cvelistv5 – Published: 2025-10-03 00:00 – Updated: 2025-10-03 17:22
VLAI?
Summary
Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.
Severity ?
7.4 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Unity3D | Unity Editor |
Affected:
6000.3 , < 6000.3.0b4
(custom)
Affected: 6000.2 , < 6000.2.6f2 (custom) Affected: 6000.0 LTS , < 6000.0.58f2 (custom) Affected: 2022.3 xLTS , < 2022.3.67f2 (custom) Affected: 2021.3 xLTS , < 2021.3.56f2 (custom) Affected: 6000.1 , < 6000.1.17f1 (custom) Affected: 2023.2 , < 2023.2.22f1 (custom) Affected: 2023.1 , < 2023.1.22f1 (custom) Affected: 2022.3 LTS , < 2022.3.62f2 (custom) Affected: 2022.2 , < 2022.2.23f1 (custom) Affected: 2022.1 , < 2022.1.25f1 (custom) Affected: 2021.3 LTS , < 2021.3.45f2 (custom) Affected: 2021.2 , < 2021.2.20f1 (custom) Affected: 2021.1 , < 2021.1.29f1 (custom) Affected: 2020.3 , < 2020.3.49f1 (custom) Affected: 2020.2 , < 2020.2.8f1 (custom) Affected: 2020.1 , < 2020.1.18f1 (custom) Affected: 2019.4 LTS , < 2019.4.41f1 (custom) Affected: 2019.3 , < 2019.3.17f1 (custom) Affected: 2019.2 , < 2019.2.23f1 (custom) Affected: 2017.1.2p4 , < 2019.1.15f1 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-59489",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-03T13:54:27.467605Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-426",
"description": "CWE-426 Untrusted Search Path",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-03T13:56:31.987Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Unity Editor",
"vendor": "Unity3D",
"versions": [
{
"lessThan": "6000.3.0b4",
"status": "affected",
"version": "6000.3",
"versionType": "custom"
},
{
"lessThan": "6000.2.6f2",
"status": "affected",
"version": "6000.2",
"versionType": "custom"
},
{
"lessThan": "6000.0.58f2",
"status": "affected",
"version": "6000.0 LTS",
"versionType": "custom"
},
{
"lessThan": "2022.3.67f2",
"status": "affected",
"version": "2022.3 xLTS",
"versionType": "custom"
},
{
"lessThan": "2021.3.56f2",
"status": "affected",
"version": "2021.3 xLTS",
"versionType": "custom"
},
{
"lessThan": "6000.1.17f1",
"status": "affected",
"version": "6000.1",
"versionType": "custom"
},
{
"lessThan": "2023.2.22f1",
"status": "affected",
"version": "2023.2",
"versionType": "custom"
},
{
"lessThan": "2023.1.22f1",
"status": "affected",
"version": "2023.1",
"versionType": "custom"
},
{
"lessThan": "2022.3.62f2",
"status": "affected",
"version": "2022.3 LTS",
"versionType": "custom"
},
{
"lessThan": "2022.2.23f1",
"status": "affected",
"version": "2022.2",
"versionType": "custom"
},
{
"lessThan": "2022.1.25f1",
"status": "affected",
"version": "2022.1",
"versionType": "custom"
},
{
"lessThan": "2021.3.45f2",
"status": "affected",
"version": "2021.3 LTS",
"versionType": "custom"
},
{
"lessThan": "2021.2.20f1",
"status": "affected",
"version": "2021.2",
"versionType": "custom"
},
{
"lessThan": "2021.1.29f1",
"status": "affected",
"version": "2021.1",
"versionType": "custom"
},
{
"lessThan": "2020.3.49f1",
"status": "affected",
"version": "2020.3",
"versionType": "custom"
},
{
"lessThan": "2020.2.8f1",
"status": "affected",
"version": "2020.2",
"versionType": "custom"
},
{
"lessThan": "2020.1.18f1",
"status": "affected",
"version": "2020.1",
"versionType": "custom"
},
{
"lessThan": "2019.4.41f1",
"status": "affected",
"version": "2019.4 LTS",
"versionType": "custom"
},
{
"lessThan": "2019.3.17f1",
"status": "affected",
"version": "2019.3",
"versionType": "custom"
},
{
"lessThan": "2019.2.23f1",
"status": "affected",
"version": "2019.2",
"versionType": "custom"
},
{
"lessThan": "2019.1.15f1",
"status": "affected",
"version": "2017.1.2p4",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6000.3.0b4",
"versionStartIncluding": "6000.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6000.2.6f2",
"versionStartIncluding": "6000.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6000.0.58f2",
"versionStartIncluding": "6000.0 LTS",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2022.3.67f2",
"versionStartIncluding": "2022.3 xLTS",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2021.3.56f2",
"versionStartIncluding": "2021.3 xLTS",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6000.1.17f1",
"versionStartIncluding": "6000.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.2.22f1",
"versionStartIncluding": "2023.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.22f1",
"versionStartIncluding": "2023.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2022.3.62f2",
"versionStartIncluding": "2022.3 LTS",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2022.2.23f1",
"versionStartIncluding": "2022.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2022.1.25f1",
"versionStartIncluding": "2022.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2021.3.45f2",
"versionStartIncluding": "2021.3 LTS",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2021.2.20f1",
"versionStartIncluding": "2021.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2021.1.29f1",
"versionStartIncluding": "2021.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.3.49f1",
"versionStartIncluding": "2020.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.2.8f1",
"versionStartIncluding": "2020.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.1.18f1",
"versionStartIncluding": "2020.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.4.41f1",
"versionStartIncluding": "2019.4 LTS",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.3.17f1",
"versionStartIncluding": "2019.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.2.23f1",
"versionStartIncluding": "2019.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unity3d:unity_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.1.15f1",
"versionStartIncluding": "2017.1.2p4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-03T17:22:11.001Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://unity.com/security#security-updates-and-patches"
},
{
"url": "https://unity.com/security/sept-2025-01"
},
{
"url": "https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-59489",
"datePublished": "2025-10-03T00:00:00.000Z",
"dateReserved": "2025-09-16T00:00:00.000Z",
"dateUpdated": "2025-10-03T17:22:11.001Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37250 (GCVE-0-2023-37250)
Vulnerability from cvelistv5 – Published: 2023-08-20 00:00 – Updated: 2024-10-08 14:24
VLAI?
Summary
Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:09:34.060Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://unity3d.com"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/287122"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.parsec.app/hc/en-us/articles/18311425588237-CVE-2023-37250"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37250",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:24:41.484529Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T14:24:57.559Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in \"Per User\" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-21T18:44:15.314679",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://unity3d.com"
},
{
"url": "https://www.kb.cert.org/vuls/id/287122"
},
{
"url": "https://support.parsec.app/hc/en-us/articles/18311425588237-CVE-2023-37250"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-37250",
"datePublished": "2023-08-20T00:00:00",
"dateReserved": "2023-06-29T00:00:00",
"dateUpdated": "2024-10-08T14:24:57.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-9288 (GCVE-0-2015-9288)
Vulnerability from cvelistv5 – Published: 2019-07-29 15:28 – Updated: 2024-08-06 08:43
VLAI?
Summary
The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim's credentials
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:43:42.607Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://blogs.unity3d.com/2015/06/06/security-update-coming-for-web-player/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim\u0027s credentials"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-07-29T15:28:09",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://blogs.unity3d.com/2015/06/06/security-update-coming-for-web-player/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9288",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim\u0027s credentials"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://blogs.unity3d.com/2015/06/06/security-update-coming-for-web-player/",
"refsource": "CONFIRM",
"url": "https://blogs.unity3d.com/2015/06/06/security-update-coming-for-web-player/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-9288",
"datePublished": "2019-07-29T15:28:09",
"dateReserved": "2019-07-27T00:00:00",
"dateUpdated": "2024-08-06T08:43:42.607Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}