CVE-2026-25918
Awaiting Analysis Awaiting Analysis - Queue
Credential Exposure via Verbose Logging in unity-cli sign-package Command

Publication date: 2026-02-09

Last updated on: 2026-02-28

Assigner: GitHub, Inc.

Description
unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 , the sign-package command in @rage-against-the-pixel/unity-cli logs sensitive credentials in plaintext when the --verbose flag is used. Command-line arguments including --email and --password are output via JSON.stringify without sanitization, exposing secrets to shell history, CI/CD logs, and log aggregation systems. This vulnerability is fixed in 1.8.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-09
Last Modified
2026-02-28
Generated
2026-05-07
AI Q&A
2026-02-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rageagainstthepixel unity-cli to 1.8.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Can you explain this vulnerability to me?

The vulnerability exists in the unity-cli command line utility for the Unity Game Engine, specifically in versions prior to 1.8.2. When using the sign-package command with the --verbose flag, sensitive credentials such as email and password are logged in plaintext. These credentials are output via JSON.stringify without any sanitization, which means secrets can be exposed in shell history, CI/CD logs, and log aggregation systems.


How can this vulnerability impact me? :

This vulnerability can lead to the exposure of sensitive credentials including email addresses and passwords. Because these secrets are logged in plaintext, attackers or unauthorized users with access to shell history, CI/CD logs, or log aggregation systems could retrieve these credentials. This exposure increases the risk of unauthorized access, credential theft, and potential compromise of systems or accounts associated with those credentials.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the unity-cli utility to version 1.8.2 or later, where the issue is fixed.

Avoid using the --verbose flag with the sign-package command in versions prior to 1.8.2 to prevent sensitive credentials from being logged in plaintext.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart