CVE-2025-13465

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-13465
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13465.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-13465
Aliases
Downstream
Related
Published
2026-01-21T20:16:05.250Z
Modified
2026-01-23T05:50:31.720046Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

This issue is patched on 4.17.23

References

Affected packages

Git / github.com/lodash/lodash

Affected ranges

Type
GIT
Repo
https://github.com/lodash/lodash
Events

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13465.json"