Skip to content

Plaintext Credential Exposure in Debug Logs (sign-package command)

Moderate
StephenHodgson published GHSA-4255-c27h-62m5 Feb 8, 2026

Package

npm @rage-against-the-pixel/unity-cli (npm)

Affected versions

< 1.8.2

Patched versions

1.8.2

Description

The sign-package command in @rage-against-the-pixel/unity-cli logs sensitive credentials in plaintext when the --verbose flag is used. Command-line arguments including --email and --password are output via JSON.stringify without sanitization, exposing secrets to shell history, CI/CD logs, and log aggregation systems.

Users who run sign-package with --verbose and credential arguments expose their Unity account passwords. This affects all versions prior to 1.8.2. The vulnerability requires explicit user action (using --verbose) but creates significant risk in automated and shared environments.

Workaround: Use environment variables (UNITY_USERNAME, UNITY_PASSWORD) instead of command-line arguments, and avoid the --verbose flag when working with credentials.

Existing RageAgainstThePixel and Buildalon GitHub actions are unaffected as they use the environment variables exclusively.

Severity

Moderate

CVE ID

CVE-2026-25918

Weaknesses

Insertion of Sensitive Information into Log File

The product writes sensitive information to a log file. Learn more on MITRE.