DEBIAN-CVE-2025-13465

Source
https://security-tracker.debian.org/tracker/CVE-2025-13465
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13465.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-13465
Upstream
Published
2026-01-21T20:16:05.250Z
Modified
2026-01-22T11:15:59.288929Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwriting their original behavior. This issue is patched on 4.17.23

References

Affected packages

Debian:11 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.17.21+dfsg+~cs8.31.173-1
4.17.21+dfsg+~cs8.31.189.20210220-1
4.17.21+dfsg+~cs8.31.189.20210220-2~bpo11+1
4.17.21+dfsg+~cs8.31.189.20210220-2
4.17.21+dfsg+~cs8.31.189.20210220-3
4.17.21+dfsg+~cs8.31.196.20210220-1
4.17.21+dfsg+~cs8.31.196.20210220-2
4.17.21+dfsg+~cs8.31.198.20210220-1
4.17.21+dfsg+~cs8.31.198.20210220-2
4.17.21+dfsg+~cs8.31.198.20210220-3
4.17.21+dfsg+~cs8.31.198.20210220-4
4.17.21+dfsg+~cs8.31.198.20210220-5
4.17.21+dfsg+~cs8.31.198.20210220-6
4.17.21+dfsg+~cs8.31.198.20210220-7
4.17.21+dfsg+~cs8.31.198.20210220-8
4.17.21+dfsg+~cs8.31.198.20210220-9~bpo11+1
4.17.21+dfsg+~cs8.31.198.20210220-9~bpo11+2
4.17.21+dfsg+~cs8.31.198.20210220-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13465.json"

Debian:12 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.17.21+dfsg+~cs8.31.198.20210220-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13465.json"

Debian:13 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.17.21+dfsg+~cs8.31.198.20210220-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13465.json"

Debian:14 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.17.21+dfsg+~cs8.31.198.20210220-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13465.json"