Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions (GHSA-xxjr-mmjv-4gpg)
- Severity:
- Medium
Description
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
Recommendation
Update the lodash-es package to the latest compatible version. Followings are version details:
- Affected version(s): >= 4.0.0, <= 4.17.22
- Patched version(s): 4.17.23
References
Related Issues
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- Command Injection in lodash (GHSA-35jh-r3h4-6jhm) - CVE-2021-23337
- Prototype Pollution in lodash (GHSA-p6mc-m468-83gw) 5 - CVE-2020-8203
- Prototype Pollution in lodash (GHSA-jf85-cpcp-j695) 2 - CVE-2019-10744
- Tags:
- npm
- lodash-es
Anything's wrong? Let us know Last updated on January 21, 2026