A nearly decade-old Unity security flaw has been disclosed, prompting developers to patch and recompile affected games built since 2017.
Unity security flaw affects multiple platforms

Unity confirmed last week that a newly patched vulnerability impacts projects created using Unity 2017.1 or later. The flaw stretches across Android, macOS, Linux, and Windows, leaving games built with certain versions of the Unity Editor at risk.
Although no public attacks have been detected, the company urges developers to take action. Anyone who has published a game or app since 2017 using Unity’s engine may need to update their projects to stay protected.
Details of the Unity security flaw
Security researcher RyotaK first reported the issue on June 4. According to Unity, the problem lies in how some versions of the Editor handle file loading. This behavior can allow attackers to exploit local file inclusion vulnerabilities or load unsafe files.
If triggered, the flaw could lead to two outcomes:
- Information disclosure at the privilege level of the affected app
- Local code execution that runs within the same access level
Put simply, a malicious actor could use this opening to run unauthorized code or dig into sensitive data, depending on device permissions.
Unity releases patch and developer tools
To help developers resolve the issue, Unity has released updated patches for all impacted versions. Developers are advised to:
- Download the patched Editor version via Unity Hub or the Download Archive
- Rebuild and republish their games or apps
- Use Unity’s standalone patch tool for already-built projects on Android, macOS, and Windows
What if your Unity game is still in development?
If you’re mid-project, install the patched Editor update before compiling any new builds. Unity has made the fixed versions available across all recent Unity branches, making it easier to stay protected without starting from scratch.
No current exploits, but vigilance is key
Unity stated there’s no evidence the vulnerability has been exploited so far. Even so, the company is strongly encouraging developers to act now rather than wait. It’s a silent flaw, one that doesn’t show itself until it’s already being used against you.