DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-25918: Game Over: Unity-CLI Spills Secrets in Verbose Mode

Game Over: Unity-CLI Spills Secrets in Verbose Mode

Vulnerability ID: CVE-2026-25918
CVSS Score: 5.9
Published: 2026-02-10

In the world of DevOps, visibility is everything. We want logs, metrics, and traces. But sometimes, tools give us a little too much visibility. The unity-cli tool, a popular wrapper for automating Unity Game Engine tasks, was found to be indiscriminately logging sensitive credentials—passwords, serials, and auth tokens—directly to standard output when the --verbose flag was engaged. This vulnerability turns your CI/CD logs into a treasure map for attackers looking to hijack your game development pipeline.

TL;DR

If you used unity-cli versions < 1.8.2 with the --verbose flag, your Unity credentials (password, serial, token) were printed in plaintext to your console logs. Attackers with access to your CI/CD history or shell logs can harvest these secrets.


⚠️ Exploit Status: POC

Technical Details

  • CWE ID: CWE-532
  • Attack Vector: Local / Context Dependent
  • CVSS: 5.9 (Medium)
  • Confidentiality Impact: High
  • Integrity Impact: None
  • Exploit Status: Trivial (Log Inspection)

Affected Systems

  • @rage-against-the-pixel/unity-cli < 1.8.2
  • GitHub Actions Workflows using unity-cli
  • Jenkins Pipelines using unity-cli
  • GitLab CI Runners using unity-cli
  • @rage-against-the-pixel/unity-cli: < 1.8.2 (Fixed in: 1.8.2)

Code Analysis

Commit: 8d4d67b

feat: added data masking for sensitive args

+ private scrubSensitiveData(obj: any): any { ... }
Enter fullscreen mode Exit fullscreen mode

Exploit Details

  • Manual: Log inspection of CI/CD pipelines running with --verbose

Mitigation Strategies

  • Input Sanitization
  • Secret Masking
  • Log Rotation

Remediation Steps:

  1. Upgrade @rage-against-the-pixel/unity-cli to version 1.8.2 or higher.
  2. Rotate all Unity credentials (passwords, tokens, serials) used in CI environments.
  3. Audit and delete historical CI/CD logs that may contain verbose output.
  4. Switch from CLI arguments to Environment Variables for passing secrets where possible.

References


Read the full report for CVE-2026-25918 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)