CVE-2026-25918: CWE-532: Insertion of Sensitive Information into Log File in RageAgainstThePixel unity-cli
CVE-2026-25918 is a medium severity vulnerability in the RageAgainstThePixel unity-cli tool prior to version 1. 8. 2. The sign-package command logs sensitive credentials such as email and password in plaintext when the --verbose flag is used. These credentials are output via JSON. stringify without sanitization, exposing secrets to shell history, CI/CD logs, and log aggregation systems. Exploitation requires local access and the use of the verbose flag, with no user interaction needed. The vulnerability risks credential leakage, potentially leading to unauthorized access or further compromise. It is fixed in version 1. 8.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25918 affects the unity-cli command line utility developed by RageAgainstThePixel, used for managing Unity Game Engine projects. Specifically, versions prior to 1.8.2 contain a flaw in the sign-package command when executed with the --verbose flag. In this mode, the utility logs command-line arguments including sensitive credentials such as --email and --password in plaintext by serializing them with JSON.stringify without any sanitization or redaction. This results in sensitive information being recorded in various locations such as shell history files, continuous integration/continuous deployment (CI/CD) pipeline logs, and centralized log aggregation systems. The vulnerability is classified under CWE-532, which concerns the insertion of sensitive information into log files. The CVSS 4.0 base score is 5.9 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), but partial attack type (AT:P) and high impact on confidentiality (VC:H). There is no impact on integrity or availability. The flaw does not require authentication but does require the attacker to have local access and to trigger the verbose logging. Although no known exploits are reported in the wild, the exposure of credentials in logs can lead to credential theft and subsequent unauthorized access to Unity project resources or associated services. The issue is resolved in version 1.8.2 of unity-cli by presumably sanitizing or omitting sensitive data from logs.
Potential Impact
For European organizations, especially those involved in game development or using Unity-based pipelines, this vulnerability poses a risk of credential leakage. If an attacker gains local access to developer machines, build servers, or CI/CD environments where unity-cli is used with verbose logging enabled, they could extract sensitive credentials from logs. This could lead to unauthorized access to Unity accounts, project repositories, or cloud services tied to these credentials, potentially resulting in intellectual property theft, project sabotage, or further lateral movement within the network. The exposure in CI/CD logs is particularly concerning as these logs may be stored for extended periods and accessible to multiple personnel or systems, increasing the attack surface. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations with strict data protection regulations, such as GDPR, must consider the risk of sensitive data exposure and potential compliance violations.
Mitigation Recommendations
European organizations should immediately upgrade unity-cli to version 1.8.2 or later to ensure the vulnerability is patched. Until the upgrade is applied, avoid using the --verbose flag with the sign-package command, especially in production or CI/CD environments. Review and sanitize existing logs to remove any sensitive credentials that may have been recorded. Implement strict access controls on log files and CI/CD systems to limit exposure. Additionally, consider using environment variables or secure vaults for credential management instead of passing sensitive data via command-line arguments. Conduct regular audits of logging practices to ensure sensitive information is not inadvertently exposed. Educate developers and DevOps teams about the risks of verbose logging and secure handling of credentials. Finally, monitor for any unauthorized access attempts that could indicate exploitation of leaked credentials.
Affected Countries
Germany, France, United Kingdom, Poland, Netherlands, Sweden, Finland, Spain, Italy
CVE-2026-25918: CWE-532: Insertion of Sensitive Information into Log File in RageAgainstThePixel unity-cli
Description
CVE-2026-25918 is a medium severity vulnerability in the RageAgainstThePixel unity-cli tool prior to version 1. 8. 2. The sign-package command logs sensitive credentials such as email and password in plaintext when the --verbose flag is used. These credentials are output via JSON. stringify without sanitization, exposing secrets to shell history, CI/CD logs, and log aggregation systems. Exploitation requires local access and the use of the verbose flag, with no user interaction needed. The vulnerability risks credential leakage, potentially leading to unauthorized access or further compromise. It is fixed in version 1. 8.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-25918 affects the unity-cli command line utility developed by RageAgainstThePixel, used for managing Unity Game Engine projects. Specifically, versions prior to 1.8.2 contain a flaw in the sign-package command when executed with the --verbose flag. In this mode, the utility logs command-line arguments including sensitive credentials such as --email and --password in plaintext by serializing them with JSON.stringify without any sanitization or redaction. This results in sensitive information being recorded in various locations such as shell history files, continuous integration/continuous deployment (CI/CD) pipeline logs, and centralized log aggregation systems. The vulnerability is classified under CWE-532, which concerns the insertion of sensitive information into log files. The CVSS 4.0 base score is 5.9 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), but partial attack type (AT:P) and high impact on confidentiality (VC:H). There is no impact on integrity or availability. The flaw does not require authentication but does require the attacker to have local access and to trigger the verbose logging. Although no known exploits are reported in the wild, the exposure of credentials in logs can lead to credential theft and subsequent unauthorized access to Unity project resources or associated services. The issue is resolved in version 1.8.2 of unity-cli by presumably sanitizing or omitting sensitive data from logs.
Potential Impact
For European organizations, especially those involved in game development or using Unity-based pipelines, this vulnerability poses a risk of credential leakage. If an attacker gains local access to developer machines, build servers, or CI/CD environments where unity-cli is used with verbose logging enabled, they could extract sensitive credentials from logs. This could lead to unauthorized access to Unity accounts, project repositories, or cloud services tied to these credentials, potentially resulting in intellectual property theft, project sabotage, or further lateral movement within the network. The exposure in CI/CD logs is particularly concerning as these logs may be stored for extended periods and accessible to multiple personnel or systems, increasing the attack surface. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations with strict data protection regulations, such as GDPR, must consider the risk of sensitive data exposure and potential compliance violations.
Mitigation Recommendations
European organizations should immediately upgrade unity-cli to version 1.8.2 or later to ensure the vulnerability is patched. Until the upgrade is applied, avoid using the --verbose flag with the sign-package command, especially in production or CI/CD environments. Review and sanitize existing logs to remove any sensitive credentials that may have been recorded. Implement strict access controls on log files and CI/CD systems to limit exposure. Additionally, consider using environment variables or secure vaults for credential management instead of passing sensitive data via command-line arguments. Conduct regular audits of logging practices to ensure sensitive information is not inadvertently exposed. Educate developers and DevOps teams about the risks of verbose logging and secure handling of credentials. Finally, monitor for any unauthorized access attempts that could indicate exploitation of leaked credentials.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T16:22:17.784Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a55a74b57a58fa173403a
Added to database: 2/9/2026, 9:46:15 PM
Last enriched: 2/17/2026, 9:50:52 AM
Last updated: 2/20/2026, 10:20:48 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2858: Out-of-Bounds Read in wren-lang wren
MediumCVE-2026-27120: CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in vapor leaf-kit
MediumCVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
MediumCVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo
CriticalCVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.