By: Eliza Bennet
A newly discovered vulnerability in the Unity engine, widely utilized for Android-based mobile games, poses a severe threat to crypto wallets integrated within these applications. The vulnerability allows malicious actors to inject harmful code into games, potentially compromising users' crypto wallets. This issue affects projects dating back to 2017 and concerns systems beyond Android, including Windows, macOS, and Linux, though to varying extents. Unity has already begun distributing a patch to certain partners, but broader public guidance is anticipated shortly.
The vulnerability, classified under CVE-2025-59489, leverages Unity's runtime capacity to accept specific pre-initialization arguments. These arguments can alter where the engine searches for native libraries, opening a path for potential attackers to execute malevolent libraries. The risk primarily involves elevating privileges on desktop platforms, whereas on mobile, it allows local code execution which could infiltrate private data in wallet-related applications.
Many applications developed with Unity have integrations with wallet SDKs or custodial logins, making them susceptible to this flaw. While the injected code doesn't affect other apps directly, it could misuse the vulnerable app's privileges. Unity advises users to update applications promptly and discourage downloading potentially harmful apps from unofficial sources. Furthermore, enabling Play Protect and thoroughly checking app update logs can mitigate risk. Developers are encouraged to validate their Unity editor versions against the fixed version's table to ensure security compliance.
Users concerned about the vulnerability should avoid storing seed phrases in plaintext and consider using hardware wallets for substantial crypto holdings until confirmed Safe Unity builds are operational. Although no known exploitations have been detected so far, this vulnerability underscores the importance of vigilant security practices when handling crypto assets via gaming platforms.