CVE-2026-2950

Severity
5.3MEDIUM
EPSS
0.1%
top 78.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateApr 1

Description

Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype. The issue permits deletion of prot

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:LExploitability: 3.9 | Impact: 2.5

Affected Packages13 packages

npmlodash.unset4.0.04.18.0
CVEListV5lodash/lodash.unset4.0.04.18.0
npmlodash< 4.18.0
npmlodash-es< 4.18.0

🔴Vulnerability Details

4
GHSA
lodash vulnerable to Prototype Pollution via array path bypass in `_.unset` and `_.omit`2026-04-01
OSV
lodash vulnerable to Prototype Pollution via array path bypass in `_.unset` and `_.omit`2026-04-01
CVEList
lodash vulnerable to Prototype Pollution via array path bypass in `_.unset` and `_.omit`2026-03-31
OSV
CVE-2026-2950: Impact: Lodash versions 42026-03-31

📋Vendor Advisories

1
Debian
CVE-2026-2950: node-lodash - Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype polluti...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-2950 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-2950 (MEDIUM CVSS 5.3) | Impact: Lodash versions 4.17.23 and | cvebase.io