U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2025-59489

Change History

Initial Analysis by NIST 10/22/2025 2:12:25 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2017.4 up to (including) 2018.4
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2019.1 up to (excluding) 2019.1.15f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2019.2 up to (excluding) 2019.2.23f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2019.3 up to (including) 2019.3.17f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2020.1 up to (excluding) 2020.1.18f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2020.2 up to (excluding) 2020.2.8f1
          *cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2019.4 up to (excluding) 2019.4.41f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2020.3 up to (excluding) 2020.3.49f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2021.1 up to (excluding) 2021.1.29f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2021.2 up to (excluding) 2021.2.20f1
          *cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2021.3 up to (excluding) 2021.3.45f2
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2022.1 up to (excluding) 2022.1.25f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2022.2 up to (excluding) 2022.2.23f1
          *cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2022.3 up to (excluding) 2022.3.62f2
          *cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2023.1 up to (excluding) 2023.1.22f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 6000.1 up to (excluding) 6000.1.17f1
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 6000.2 up to (excluding) 6000.2.6f2
          *cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 6000.3 up to (excluding) 6000.3.0b4
          *cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2023.2 up to (excluding) 2023.2.22f1
          *cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 6000.0 up to (excluding) 6000.0.58f2
          *cpe:2.3:a:unity:editor:2017.1.2p4+:*:*:*:-:*:*:*
          *cpe:2.3:a:unity:editor:2017.2.0p4+:*:*:*:-:*:*:*
          *cpe:2.3:a:unity:editor:2017.3.0b9+:*:*:*:-:*:*:*
     OR
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
          cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
          cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Added Reference Type

								
							
							
						
MITRE: https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/ Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://unity.com/security#security-updates-and-patches Types: Product
Added Reference Type

								
							
							
						
MITRE: https://unity.com/security/sept-2025-01 Types: Vendor Advisory