GHSA-4255-c27h-62m5

Suggest an improvement
Source
https://github.com/advisories/GHSA-4255-c27h-62m5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-4255-c27h-62m5/GHSA-4255-c27h-62m5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4255-c27h-62m5
Aliases
Published
2026-02-10T00:25:32Z
Modified
2026-02-10T03:03:31.476323Z
Severity
  • 5.9 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
unity-cli Exposes Plaintext Credentials in Debug Logs (sign-package command)
Details

The sign-package command in @rage-against-the-pixel/unity-cli logs sensitive credentials in plaintext when the --verbose flag is used. Command-line arguments including --email and --password are output via JSON.stringify without sanitization, exposing secrets to shell history, CI/CD logs, and log aggregation systems.

Users who run sign-package with --verbose and credential arguments expose their Unity account passwords. This affects all versions prior to 1.8.2. The vulnerability requires explicit user action (using --verbose) but creates significant risk in automated and shared environments.

Workaround: Use environment variables (UNITY_USERNAME, UNITY_PASSWORD) instead of command-line arguments, and avoid the --verbose flag when working with credentials.

Existing RageAgainstThePixel and Buildalon GitHub actions are unaffected as they use the environment variables exclusively.

Database specific
{
    "github_reviewed_at": "2026-02-10T00:25:32Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-352",
        "CWE-532"
    ],
    "nvd_published_at": "2026-02-09T22:16:04Z",
    "severity": "MODERATE"
}
References

Affected packages

npm / @rage-against-the-pixel/unity-cli

Package

Name
@rage-against-the-pixel/unity-cli
View open source insights on deps.dev
Purl
pkg:npm/%40rage-against-the-pixel/unity-cli

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-4255-c27h-62m5/GHSA-4255-c27h-62m5.json"