The CVE-2025-59489 vulnerability in Unity, and how to fix it in games | Kaspersky official blog
CVE-2025-59489 is a medium-severity vulnerability in the Unity game engine affecting versions since 2017. 01, allowing attackers to execute malicious code by passing crafted startup parameters that load arbitrary libraries with the same privileges as the game. This affects Unity games on Windows, Android, Linux, and macOS. Exploitation can occur locally by launching games with malicious parameters or remotely via malicious hyperlinks if the game is registered as a URI handler. Valve and Microsoft have taken steps to mitigate risks by blocking unsafe launches and recommending uninstallations until patches are available. Developers must recompile games with patched Unity runtimes or use Unity’s Application Patcher for unsupported games. Users should promptly update games and maintain robust endpoint protection. The vulnerability enables privilege escalation and bypasses OS defenses, posing significant risks especially where games run with elevated privileges.
AI Analysis
Technical Summary
The CVE-2025-59489 vulnerability in the Unity game engine, introduced in version 2017.01, affects all modern Unity-based games across multiple platforms including Windows, Android, Linux, and macOS. The flaw allows attackers to pass specially crafted startup parameters to the Unity Runtime, which processes debugging commands such as -xrsdk-pre-init-library, –dataFolder, overrideMonoSearchPath, and -monoProfiler. These parameters enable the engine to load arbitrary dynamic libraries (.dll, .so, .dylib) specified by the attacker. Consequently, a malicious low-privilege application can launch a Unity game with these parameters, causing the game to load and execute malicious code with the same privileges as the game itself. This can lead to privilege escalation, allowing attackers to bypass OS-level sandboxing and security controls. Remote exploitation is possible if the game is registered as a URI schema handler, enabling malicious websites to trigger the game launch with malicious parameters after tricking users into downloading malicious libraries. Valve has updated Steam to block launches with unsafe parameters, and Microsoft recommends uninstalling vulnerable games until patched. Developers must update their Unity Editor and recompile games with patched runtimes or use the Unity Application Patcher for unsupported titles. Users should update games promptly and employ comprehensive endpoint security solutions to prevent exploitation. Although no real-world exploitation has been observed, the vulnerability’s ease of exploitation and widespread impact warrant immediate attention.
Potential Impact
For European organizations, the vulnerability poses a significant risk especially in sectors where Unity-based games or applications are widely used, such as gaming companies, educational institutions, and enterprises using gamified training or simulation software. Exploitation can lead to unauthorized code execution, privilege escalation, and potential data breaches or system compromise. Since the vulnerability affects multiple OS platforms, including Windows and Linux which are common in enterprise environments, the attack surface is broad. The ability to bypass OS defenses and antivirus detection increases the risk of persistent threats. Additionally, the potential for remote exploitation via URI handlers raises concerns for users interacting with malicious websites. This could impact not only individual users but also corporate networks if infected devices connect to internal resources. The disruption caused by forced uninstallations or patching delays could also affect business continuity. Overall, the vulnerability could facilitate lateral movement, espionage, or ransomware deployment if exploited in targeted attacks against European organizations.
Mitigation Recommendations
1. Developers must urgently update their Unity Editor to the patched version and recompile all affected games and applications, then republish updated versions on all distribution platforms. 2. For unsupported or legacy games, use the Unity Application Patcher to replace vulnerable runtime libraries, especially on Windows where patching is more feasible. 3. End users should promptly update all Unity-based games and applications to the latest patched versions. 4. Until patches are available, uninstall vulnerable games as recommended by Microsoft, particularly in enterprise environments. 5. Steam users should ensure their client is updated to benefit from Valve’s mitigation that blocks unsafe game launches. 6. Employ endpoint protection solutions capable of detecting and blocking suspicious library loading and unauthorized process launches, such as Kaspersky Premium or equivalent. 7. Disable or restrict URI schema handler registrations for Unity games where possible to reduce remote exploitation risk. 8. Educate users about the risks of downloading libraries or launching games from untrusted sources or links. 9. Monitor network and endpoint logs for unusual game launch parameters or library loads indicative of exploitation attempts. 10. Coordinate with software vendors and platform providers to ensure timely patch deployment and communication.
Affected Countries
Germany, United Kingdom, France, Poland, Netherlands, Italy, Spain, Sweden, Finland, Belgium
The CVE-2025-59489 vulnerability in Unity, and how to fix it in games | Kaspersky official blog
Description
CVE-2025-59489 is a medium-severity vulnerability in the Unity game engine affecting versions since 2017. 01, allowing attackers to execute malicious code by passing crafted startup parameters that load arbitrary libraries with the same privileges as the game. This affects Unity games on Windows, Android, Linux, and macOS. Exploitation can occur locally by launching games with malicious parameters or remotely via malicious hyperlinks if the game is registered as a URI handler. Valve and Microsoft have taken steps to mitigate risks by blocking unsafe launches and recommending uninstallations until patches are available. Developers must recompile games with patched Unity runtimes or use Unity’s Application Patcher for unsupported games. Users should promptly update games and maintain robust endpoint protection. The vulnerability enables privilege escalation and bypasses OS defenses, posing significant risks especially where games run with elevated privileges.
AI-Powered Analysis
Technical Analysis
The CVE-2025-59489 vulnerability in the Unity game engine, introduced in version 2017.01, affects all modern Unity-based games across multiple platforms including Windows, Android, Linux, and macOS. The flaw allows attackers to pass specially crafted startup parameters to the Unity Runtime, which processes debugging commands such as -xrsdk-pre-init-library, –dataFolder, overrideMonoSearchPath, and -monoProfiler. These parameters enable the engine to load arbitrary dynamic libraries (.dll, .so, .dylib) specified by the attacker. Consequently, a malicious low-privilege application can launch a Unity game with these parameters, causing the game to load and execute malicious code with the same privileges as the game itself. This can lead to privilege escalation, allowing attackers to bypass OS-level sandboxing and security controls. Remote exploitation is possible if the game is registered as a URI schema handler, enabling malicious websites to trigger the game launch with malicious parameters after tricking users into downloading malicious libraries. Valve has updated Steam to block launches with unsafe parameters, and Microsoft recommends uninstalling vulnerable games until patched. Developers must update their Unity Editor and recompile games with patched runtimes or use the Unity Application Patcher for unsupported titles. Users should update games promptly and employ comprehensive endpoint security solutions to prevent exploitation. Although no real-world exploitation has been observed, the vulnerability’s ease of exploitation and widespread impact warrant immediate attention.
Potential Impact
For European organizations, the vulnerability poses a significant risk especially in sectors where Unity-based games or applications are widely used, such as gaming companies, educational institutions, and enterprises using gamified training or simulation software. Exploitation can lead to unauthorized code execution, privilege escalation, and potential data breaches or system compromise. Since the vulnerability affects multiple OS platforms, including Windows and Linux which are common in enterprise environments, the attack surface is broad. The ability to bypass OS defenses and antivirus detection increases the risk of persistent threats. Additionally, the potential for remote exploitation via URI handlers raises concerns for users interacting with malicious websites. This could impact not only individual users but also corporate networks if infected devices connect to internal resources. The disruption caused by forced uninstallations or patching delays could also affect business continuity. Overall, the vulnerability could facilitate lateral movement, espionage, or ransomware deployment if exploited in targeted attacks against European organizations.
Mitigation Recommendations
1. Developers must urgently update their Unity Editor to the patched version and recompile all affected games and applications, then republish updated versions on all distribution platforms. 2. For unsupported or legacy games, use the Unity Application Patcher to replace vulnerable runtime libraries, especially on Windows where patching is more feasible. 3. End users should promptly update all Unity-based games and applications to the latest patched versions. 4. Until patches are available, uninstall vulnerable games as recommended by Microsoft, particularly in enterprise environments. 5. Steam users should ensure their client is updated to benefit from Valve’s mitigation that blocks unsafe game launches. 6. Employ endpoint protection solutions capable of detecting and blocking suspicious library loading and unauthorized process launches, such as Kaspersky Premium or equivalent. 7. Disable or restrict URI schema handler registrations for Unity games where possible to reduce remote exploitation risk. 8. Educate users about the risks of downloading libraries or launching games from untrusted sources or links. 9. Monitor network and endpoint logs for unusual game launch parameters or library loads indicative of exploitation attempts. 10. Coordinate with software vendors and platform providers to ensure timely patch deployment and communication.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/update-unity-games-cve-2025-59489/54542/","fetched":true,"fetchedAt":"2025-10-07T09:03:53.281Z","wordCount":1283}
Threat ID: 68e4d779769a746382d0cc09
Added to database: 10/7/2025, 9:03:53 AM
Last enriched: 10/7/2025, 9:04:07 AM
Last updated: 10/7/2025, 11:30:32 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations
MediumCVE-2025-11360: Cross Site Scripting in jakowenko double-take
MediumCVE-2025-11359: SQL Injection in code-projects Simple Banking System
MediumCVE-2025-10645: CWE-532 Insertion of Sensitive Information into Log File in webfactory WP Reset
MediumCVE-2025-11358: SQL Injection in code-projects Simple Banking System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.