Description
lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Recommendation
Update the lodash-es package to the latest compatible version. Followings are version details:
- Affected version(s): < 4.17.21
- Patched version(s): 4.17.21
References
- GHSA-35jh-r3h4-6jhm
- snyk.io
- www.oracle.com
- cert-portal.siemens.com
- security.netapp.com
- CVE-2021-23337
- CWE-77
- CWE-94
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Command Injection in lodash - CVE-2021-23337
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-x5rq-j2xg-h7qm) 2 - CVE-2019-1010266
- Command Injection in ungit (GHSA-vjfr-p6hp-jqqw) - CVE-2015-4130
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- Tags:
- npm
- lodash-es
Anything's wrong? Let us know Last updated on August 12, 2025