Description
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Recommendation
Update the lodash-amd
package to the latest compatible version. Followings are version details:
- Affected version(s): < 4.17.13
- Patched version(s): 4.17.13
References
- GHSA-jf85-cpcp-j695
- snyk.io
- access.redhat.com
- support.f5.com
- www.oracle.com
- security.netapp.com
- CVE-2019-10744
- CWE-1321
- CWE-20
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-x5rq-j2xg-h7qm) 3 - CVE-2019-1010266
- Prototype Pollution in lodash (GHSA-jf85-cpcp-j695) 2 - CVE-2019-10744
- Passbolt Browser Extension leaks password information - CVE-2024-33669
- JSONata expression can pollute the "Object" prototype - CVE-2024-27307
- Tags:
- npm
- lodash-amd
Anything's wrong? Let us know Last updated on August 12, 2025