Vulnerability Description
unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 , the sign-package command in @rage-against-the-pixel/unity-cli logs sensitive credentials in plaintext when the --verbose flag is used. Command-line arguments including --email and --password are output via JSON.stringify without sanitization, exposing secrets to shell history, CI/CD logs, and log aggregation systems. This vulnerability is fixed in 1.8.2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rageagainstthepixel | Unity-Cli | < 1.8.2 |
Related Weaknesses (CWE)
References
- https://github.com/RageAgainstThePixel/unity-cli/commit/8d4d67b23d7c5fd8f00df3f0Patch
- https://github.com/RageAgainstThePixel/unity-cli/releases/tag/v1.8.2Release Notes
- https://github.com/RageAgainstThePixel/unity-cli/security/advisories/GHSA-4255-cVendor Advisory
FAQ
What is CVE-2026-25918?
CVE-2026-25918 is a vulnerability with a CVSS score of 5.5 (MEDIUM). unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 , the sign-package command in @rage-against-the-pixel/unity-cli logs sensitive credentials in plaintext when the --verbose...
How severe is CVE-2026-25918?
CVE-2026-25918 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25918?
Check the references section above for vendor advisories and patch information. Affected products include: Rageagainstthepixel Unity-Cli.