CVE-2025-13465

EUVD-2025-206319
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

This issue is patched on 4.17.23
Prototype Pollution
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
lodashlodash
4.0.0 ≤
𝑥
< 4.17.23
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
node-lodash
bookworm
vulnerable
bullseye
vulnerable
forky
4.17.23+dfsg-1
fixed
sid
4.18.1+dfsg-1
fixed
trixie
vulnerable