CVE-2026-4800 — Code Injection in Lodash.template
Severity
9.8CRITICALNVD
CNA7.2GHSA7.2OSV7.2
EPSS
0.1%
top 74.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 31
Latest updateApr 1
Description
Impact:
The fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.
Additionally, _.template uses assignInWith t…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages10 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
2🕵️Threat Intelligence
1💬Community
16Bugzilla▶
CVE-2026-4800 prometheus: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all]↗2026-04-01
Bugzilla▶
CVE-2026-4800 cachelib: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all]↗2026-04-01
Bugzilla▶
CVE-2026-4800 cachelib: lodash: Arbitrary code execution via untrusted input in template imports [epel-all]↗2026-04-01
Bugzilla▶
CVE-2026-4800 pgadmin4: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all]↗2026-04-01
Bugzilla▶
CVE-2026-4800 pcs: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all]↗2026-04-01