CVE-2025-59489 Arbitrary Code Execution in Unity Runtime #1498
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
CVE-2025-59489 is an arbitrary code execution vulnerability in the Unity Runtime affecting projects built with Unity 2017.1+. Unity released fixes for 2019.1+ and a Unity Binary Patch tool; developers must update, rebuild, and republish. The finding was validated on Android 16.0 (Android Studio Emulator). Official advisory: Unity Securit...
🔧 Technical Details
Abuse an exported Intent-to-CLI bridge in Unity: When
UnityPlayerActivity
(orUnityPlayerGameActivity
) is exported, any app—and sometimes a website viaandroid.intent.category.BROWSABLE
—can send theunity
extra. Unity treats this extra as command-line flags. Craftam start ... -e unity "<flags>"
(or anintent:
URL) to control runtime behavior.Pre-init native library injection: Supply
-xrsdk-pre-init-library <absolute-path>
so Unity invokesdlopen(<path>, RTLD_NOW)
during early initialization, executing attacker code with the target app’s UID and permissions. The path must resolve within the linker’s permitted namespace (e.g., under/data
), and the file need not end with.so
if it’s a valid ELF.Payload placement strategies: Locally, ship a payload library and set
andro...
🤖 Agent Actions
Updates completed.
What I added
New technique in Android Intent Injection page:
Checklist improvements:
Files modified
Why here
References added in modified files
No new pages were needed; content integrates cleanly with existing Android mobile pentesting structure.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.