Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23
References
| Link | Resource |
|---|---|
| https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg | Vendor Advisory |
Configurations
History
17 Feb 2026, 17:10
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| First Time |
Lodash
Lodash lodash |
|
| References | () https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg - Vendor Advisory |
21 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 20:16
Updated : 2026-02-17 17:10
NVD link : CVE-2025-13465
Mitre link : CVE-2025-13465
CVE.ORG link : CVE-2025-13465
JSON object : View
Products Affected
lodash
- lodash
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
