Description
Versions of lodash.defaultsdeep before 4.6.1 are vulnerable to Prototype Pollution. The function ‘defaultsDeep’ may allow a malicious user to modify the prototype of Object via __proto__ causing the addition or modification of an existing property that will exist on all objects.
Recommendation
Update the lodash.defaultsdeep package to the latest compatible version. Followings are version details:
- Affected version(s): < 4.6.1
- Patched version(s): 4.6.1
References
Related Issues
- Angular vulnerable to Cross-site Scripting - CVE-2020-7676
- rollbar vulnerable to prototype pollution - CVE-2025-57325
- csvjson vulnerable to prototype injection - CVE-2025-57318
- Prebid.js NPM package briefly compromised - CVE-2025-59038
- Tags:
- npm
- lodash.defaultsdeep
Anything's wrong? Let us know Last updated on January 09, 2023