Lodash vulnerabilities
10 known vulnerabilities affecting lodash/lodash.
Total CVEs
10
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH2MEDIUM6
Vulnerabilities
Page 1 of 1
CVE-2026-4800CRITICALCVSS 9.8fixed in 4.17.212026-03-31
CVE-2026-4800 [HIGH] CVE-2026-4800: Impact:
The fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added valida
Impact:
The fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inj
cvelistv5nvd
CVE-2026-2950MEDIUMCVSS 5.3≥ 4.0.0, < 4.17.232026-03-31
CVE-2026-2950 [MEDIUM] CVE-2026-2950: Impact:
Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset an
Impact:
Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion o
cvelistv5nvd
CVE-2025-13465MEDIUMCVSS 6.9≥ 4.0.0, < 4.17.23≥ 4.17.23, < 4.18.02026-01-21
CVE-2025-13465 [MEDIUM] CWE-1321 CVE-2025-13465: Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omi
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23
cvelistv5nvd
CVE-2021-23337HIGHCVSS 7.2PoCfixed in 4.17.21≥ 4.0.0, < 4.18.02021-02-15
CVE-2021-23337 [HIGH] CWE-94 CVE-2021-23337: Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
nvd
CVE-2020-28500MEDIUMCVSS 5.3fixed in 4.17.212021-02-15
CVE-2020-28500 [MEDIUM] CVE-2020-28500: Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
nvd
CVE-2020-8203HIGHCVSS 7.4fixed in 4.17.202020-07-15
CVE-2020-8203 [HIGH] CWE-770 CVE-2020-8203: Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
nvd
CVE-2019-10744CRITICALCVSS 9.1fixed in 4.17.122019-07-26
CVE-2019-10744 [CRITICAL] CWE-1321 CVE-2019-10744: Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDe
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
nvd
CVE-2019-1010266MEDIUMCVSS 6.5fixed in 4.17.11v<4.17.11 [fixed: 4.7.11]2019-07-17
CVE-2019-1010266 [MEDIUM] CWE-400 CVE-2019-1010266: lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: D
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.
cvelistv5nvd
CVE-2018-16487MEDIUMCVSS 5.6fixed in 4.17.112019-02-01
CVE-2018-16487 [MEDIUM] CWE-400 CVE-2018-16487: A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWit
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
nvd
CVE-2018-3721MEDIUMCVSS 6.5fixed in 4.17.52018-06-07
CVE-2018-3721 [MEDIUM] CWE-471 CVE-2018-3721: lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulner
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
nvd