CVE-2025-13465

EUVD-2025-206319
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

This issue is patched on 4.17.23
Prototype Pollution
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
Affected Products (NVD)
VendorProductVersion
lodashlodash
4.0.0 ≤
𝑥
< 4.17.23
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
node-lodash
bookworm
no-dsa
bullseye
vulnerable
forky
4.18.1+dfsg-3
fixed
sid
4.18.1+dfsg-3
fixed
trixie
no-dsa
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
golang-github-prometheus-node_exporter
suse enterprise server 15 SP4
1.9.1-150100.3.38.1
fixed
suse enterprise server 15 SP5
1.9.1-150100.3.38.1
fixed
suse enterprise server 15 SP6
1.9.1-150100.3.38.1
fixed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
pcs
RHEL 8.4 AUS
0:0.10.8-1.el8_4.10
fixed
RHEL 8.6 E4S
0:0.10.12-6.el8_6.12
fixed
RHEL 8.6 TUS
0:0.10.12-6.el8_6.12
fixed
RHEL 8.8 E4S
0:0.10.15-4.el8_8.10
fixed
RHEL 8.8 TUS
0:0.10.15-4.el8_8.10
fixed
RHEL 9
0:0.11.10-1.el9_7.2
fixed
pcs-snmp
RHEL 8.4 AUS
0:0.10.8-1.el8_4.10
fixed
RHEL 8.6 E4S
0:0.10.12-6.el8_6.12
fixed
RHEL 8.6 TUS
0:0.10.12-6.el8_6.12
fixed
RHEL 8.8 E4S
0:0.10.15-4.el8_8.10
fixed
RHEL 8.8 TUS
0:0.10.15-4.el8_8.10
fixed
RHEL 9
0:0.11.10-1.el9_7.2
fixed
sgx-common
RHEL 9
0:2.26-7.el9
fixed
sgx-libs
RHEL 9
0:2.26-7.el9
fixed
sgx-mpa
RHEL 9
0:2.26-7.el9
fixed
sgx-pccs
RHEL 9
0:2.26-7.el9
fixed
sgx-pccs-admin
RHEL 9
0:2.26-7.el9
fixed
sgx-pckid-tool
RHEL 9
0:2.26-7.el9
fixed
tdx-qgs
RHEL 9
0:2.26-7.el9
fixed