Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4255-c27h-62m5 | unity-cli Exposes Plaintext Credentials in Debug Logs (sign-package command) |
Sat, 28 Feb 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rageagainstthepixel:unity-cli:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Tue, 10 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rageagainstthepixel
Rageagainstthepixel unity-cli |
|
| Vendors & Products |
Rageagainstthepixel
Rageagainstthepixel unity-cli |
Mon, 09 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 , the sign-package command in @rage-against-the-pixel/unity-cli logs sensitive credentials in plaintext when the --verbose flag is used. Command-line arguments including --email and --password are output via JSON.stringify without sanitization, exposing secrets to shell history, CI/CD logs, and log aggregation systems. This vulnerability is fixed in 1.8.2. | |
| Title | unity-cli Exposes Plaintext Credentials in Debug Logs (sign-package command) | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-10T15:57:40.799Z
Reserved: 2026-02-09T16:22:17.784Z
Link: CVE-2026-25918
Updated: 2026-02-10T15:30:07.721Z
Status : Analyzed
Published: 2026-02-09T22:16:04.177
Modified: 2026-02-28T00:16:27.647
Link: CVE-2026-25918
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:15:27Z
Github GHSA