-
Notifications
You must be signed in to change notification settings - Fork 65
Description
CVE-2025-13465 - High Severity Vulnerability
Vulnerable Library - lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /server/client/package.json
Path to vulnerable library: /server/client/node_modules/lodash/package.json,/root/node_modules/lodash/package.json
Dependency Hierarchy:
- webpack-dev-server-4.2.1.tgz (Root Library)
- portfinder-1.0.28.tgz
- async-2.6.3.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
- async-2.6.3.tgz
- portfinder-1.0.28.tgz
Found in HEAD commit: f5138814bd6e253a8a5e8826b5a576edb13ed346
Found in base branch: main
Vulnerability Details
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23
Publish Date: 2026-01-21
URL: CVE-2025-13465
CVSS 3 Score Details (7.2)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-xxjr-mmjv-4gpg
Release Date: 2026-01-21
Fix Resolution: lodash-amd - 4.17.23,lodash - 4.17.23,lodash-es - 4.17.23
Step up your Open Source Security Game with Mend here