8.4
CVE-2025-59489
Trending CVE
- EPSS 0.02%
- Published 03.10.2025 00:00:00
- Last modified 06.10.2025 14:56:47
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorUnity3D
≫
Product
Unity Editor
Default Statusunaffected
Version <
6000.3.0b4
Version
6000.3
Status
affected
Version <
6000.2.6f2
Version
6000.2
Status
affected
Version <
6000.0.58f2
Version
6000.0 LTS
Status
affected
Version <
2022.3.67f2
Version
2022.3 xLTS
Status
affected
Version <
2021.3.56f2
Version
2021.3 xLTS
Status
affected
Version <
6000.1.17f1
Version
6000.1
Status
affected
Version <
2023.2.22f1
Version
2023.2
Status
affected
Version <
2023.1.22f1
Version
2023.1
Status
affected
Version <
2022.3.62f2
Version
2022.3 LTS
Status
affected
Version <
2022.2.23f1
Version
2022.2
Status
affected
Version <
2022.1.25f1
Version
2022.1
Status
affected
Version <
2021.3.45f2
Version
2021.3 LTS
Status
affected
Version <
2021.2.20f1
Version
2021.2
Status
affected
Version <
2021.1.29f1
Version
2021.1
Status
affected
Version <
2020.3.49f1
Version
2020.3
Status
affected
Version <
2020.2.8f1
Version
2020.2
Status
affected
Version <
2020.1.18f1
Version
2020.1
Status
affected
Version <
2019.4.41f1
Version
2019.4 LTS
Status
affected
Version <
2019.3.17f1
Version
2019.3
Status
affected
Version <
2019.2.23f1
Version
2019.2
Status
affected
Version <
2019.1.15f1
Version
2017.1.2p4
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.042 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
cve@mitre.org | 7.4 | 1.4 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.4 | 2.5 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-426 Untrusted Search Path
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.