A critical vulnerability (CVE-2025-59489) was discovered in **Unity**, the widely used game engine, allowing malicious apps on the same device to inject command-line arguments into Unity-based games to execute arbitrary code. Discovered by researcher **RyotaK (GMA Flatt Security)**, the flaw affects all games compiled with **Unity Editor 2017.1 or later**—covering **eight years of releases**. While Xbox games are unaffected, **Windows and Android games are highly vulnerable**, with potential remote exploitation via browsers in rare cases. The bug is **easy to exploit** and poses a massive attack surface due to Unity’s ubiquity in gaming (used by millions of titles). **Microsoft and Steam** took emergency measures: Microsoft urged users to **uninstall Unity games** until patched, while Steam **blocked launches** of Unity games using exploitable command-line parameters. Developers must **recompile and redistribute** patched versions, creating a logistical challenge. The flaw’s severity is amplified by Unity’s dominance in indie and AAA game development, risking **large-scale malware distribution**, credential theft, or system takeovers via compromised games. Active exploitation is **highly likely** given the low barrier for attackers and the sheer volume of vulnerable installations in enterprise and consumer environments.
TPRM report: https://www.rankiteo.com/company/unity
"id": "uni3933639100625",
"linkid": "unity",
"type": "Vulnerability",
"date": "6/2017",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'All Unity game developers/users '
'(8+ years of releases)',
'industry': 'Game Development',
'location': 'Global',
'name': 'Unity Technologies',
'type': 'Software Vendor'},
{'customers_affected': 'Users of Unity-based games on '
'Steam',
'industry': 'Digital Distribution',
'location': 'Global',
'name': 'Valve Corporation (Steam)',
'type': 'Gaming Platform'},
{'customers_affected': 'Windows users with Unity games '
'installed',
'industry': 'Gaming/Software',
'location': 'Global',
'name': 'Microsoft',
'type': 'Technology Corporation'},
{'customers_affected': "Players of 'Pinnacle Point'",
'industry': 'Gaming',
'name': 'Pinnacle Point (Indie Game)',
'size': 'Small (Solo Developer)',
'type': 'Game Developer'},
{'customers_affected': "Players of 'Escape Space' and "
"'Robot Arena Survivors'",
'industry': 'Gaming',
'name': 'ShidyGames',
'size': 'Small',
'type': 'Game Developer'},
{'customers_affected': "Players of Toikka's Unity games",
'industry': 'Gaming',
'name': 'Tomi Toikka (Indie Developer)',
'size': 'Solo Developer',
'type': 'Game Developer'}],
'attack_vector': ['Local (Same-Device)',
'Command-Line Injection',
'Potential Remote (Browser-Based)'],
'customer_advisories': ['Avoid downloading/uninstall Unity games until '
'developers confirm patches.',
'Monitor developer communications (e.g., Steam '
'forums, Twitter) for update announcements.',
'Report suspicious game behavior (e.g., unexpected '
'command prompts) to platforms.'],
'date_detected': '2025-06-01',
'date_publicly_disclosed': '2025-09-28',
'description': 'A critical vulnerability (CVE-2025-59489) in the Unity game '
'engine allows malicious apps on the same device to inject '
'command-line arguments into Unity-based games, enabling the '
'execution of malicious code. The flaw, discovered by '
'researcher RyotaK (GMA Flatt Security), affects all Unity '
'games compiled with Unity Editor 2017.1 or later (spanning ~8 '
'years of releases). While primarily studied on Android, the '
'bug can also impact other platforms and, in rare cases, be '
'exploited remotely via browsers. Unity released a patch in '
'late September 2025, but developers must recompile and '
'redistribute their games to mitigate the risk. Microsoft and '
'Steam (Valve) have taken emergency measures: Microsoft urged '
'Windows users to uninstall Unity games until patched, while '
'Steam blocks Unity games launched with exploit-linked '
'command-line parameters. The vulnerability is trivially '
"exploitable and poses a massive attack surface due to Unity's "
'ubiquity in gaming (e.g., used in Xbox, Windows, and indie '
'titles). Active exploitation is highly likely, as it grants '
'low-privileged attackers code execution capabilities.',
'impact': {'brand_reputation_impact': ['Unity: Criticism over 8-year '
'vulnerability window',
'Steam/Microsoft: Perceived slow '
'response to mitigation'],
'customer_complaints': ['User frustration over game unavailability',
'Trust erosion in Unity/Steam/Microsoft'],
'downtime': ['Game unavailability on Steam for unpatched titles',
'Temporary uninstallation recommended by Microsoft'],
'operational_impact': ['Developer patching backlog',
'Recompilation and redistribution required '
'for all affected games',
'Platform-level mitigations (e.g., Steam '
'command-line blocking)'],
'revenue_loss': ['Potential loss for indie developers during '
'patching delays',
'Platform revenue impact (e.g., Steam sales '
'pauses)'],
'systems_affected': ['Unity-based games (all platforms)',
'Windows systems running vulnerable Unity '
'games',
'Potential browser-based exploitation '
'vectors']},
'initial_access_broker': {'entry_point': ['Malicious local app injecting '
'command-line args',
'Potential browser-based '
'exploitation (rare)'],
'high_value_targets': ['Gaming PCs with Unity '
'titles',
'Enterprise networks with '
'Unity apps for '
'training/simulation']},
'investigation_status': 'Ongoing (Patch released; developer adoption in '
'progress)',
'lessons_learned': ['Critical vulnerabilities in widely used engines (e.g., '
'Unity) create systemic risk across entire industries '
'(gaming).',
'Patch distribution for supply-chain vulnerabilities '
'requires coordinated effort between vendors (Unity), '
'platforms (Steam), and end-users.',
"Proactive platform-level mitigations (e.g., Steam's "
'command-line blocking) can reduce exploitation windows.',
'Indie developers face disproportionate burdens during '
'mass-patching events due to limited resources.'],
'post_incident_analysis': {'corrective_actions': ['Unity: Enhanced '
'command-line argument '
'sanitization in patched '
'editor versions.',
'Platforms: Proactive '
'blocking of known exploit '
"vectors (e.g., Steam's "
'command-line filters).',
'Industry: Advocacy for '
'standardized vulnerability '
'response frameworks for '
'game engines.'],
'root_causes': ['Lack of input validation for '
'command-line arguments in Unity '
'Editor (2017.1–2025).',
'Over-reliance on developers to '
'manually apply patches (no '
'automated update mechanism for '
'compiled games).',
'Delayed public disclosure '
'(discovered in June, patched in '
'September).']},
'recommendations': ['Game developers: Prioritize recompilation and '
'redistribution of Unity games using patched editor '
'versions.',
'Platforms (Steam/Microsoft): Expand automated '
'vulnerability scanning for uploaded games.',
'End-users: Uninstall unpatched Unity games until updates '
'are available.',
'Unity: Implement automated patch propagation tools for '
'developers to streamline remediation.',
'Industry: Establish a centralized vulnerability response '
'fund to support indie developers during critical '
'patching events.'],
'references': [{'date_accessed': '2025-10-05',
'source': 'Risky Business Newsletter'},
{'source': 'Unity Security Advisory'},
{'source': 'Steam Community Announcement'},
{'source': 'Microsoft Security Blog'},
{'date_accessed': '2025-10-04',
'source': 'Pinnacle Point Developer Tweet (@ready2rungames)',
'url': 'https://bsky.app/profile/ready2rungames.bsky.social'},
{'date_accessed': '2025-10-04',
'source': 'ShidyGames Tweet (@shidygames)',
'url': 'https://twitter.com/shidygames'},
{'date_accessed': '2025-10-03',
'source': 'Tomi Toikka Tweet (@TomiToikka)',
'url': 'https://twitter.com/TomiToikka'}],
'response': {'communication_strategy': ['Public advisories from '
'Unity/Steam/Microsoft',
'Developer tweets (e.g., '
'@ready2rungames, @shidygames, '
'@TomiToikka)'],
'containment_measures': ['Steam blocking exploit-linked '
'command-line args',
'Microsoft urging game uninstallation'],
'incident_response_plan_activated': ['Unity: Patch release '
'(2025-09)',
'Steam: Command-line '
'parameter blocking',
'Microsoft: User advisory '
'to uninstall games'],
'recovery_measures': ['Recompiled game redistributions',
'Platform-level security alerts'],
'remediation_measures': ['Unity patch (requires developer '
'recompilation)',
'Developer-led game updates (e.g., '
'Pinnacle Point, ShidyGames)']},
'stakeholder_advisories': ['Unity: Urgent patch advisory for all developers '
'using Unity Editor 2017.1+.',
'Steam: Security alert blocking vulnerable game '
'launches.',
'Microsoft: Advisory to uninstall Unity games on '
'Windows until patched.'],
'title': 'Unity Game Engine Command-Line Argument Injection Vulnerability '
'(CVE-2025-59489)',
'type': ['Vulnerability', 'Code Injection', 'Supply Chain Risk'],
'vulnerability_exploited': 'CVE-2025-59489 (Unity Editor Command-Line '
'Argument Injection)'}