Description
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The functions pick, set, setWith, update, updateWith, and zipObjectDeep allow a malicious user to modify the prototype of Object if the property identifiers are user-supplied.
Recommendation
Update the lodash package to the latest compatible version. Followings are version details:
- Affected version(s): >= 3.7.0, < 4.17.19
- Patched version(s): 4.17.19
References
- GHSA-p6mc-m468-83gw
- hackerone.com
- security.netapp.com
- CVE-2020-8203
- CWE-1321
- CWE-770
- CAPEC-310
- OWASP 2021-A6
Related Issues
- Atro CSRF Middleware Bypass (security.checkOrigin) - CVE-2024-56140
- SillyTavern Web Interface Vulnerable DNS Rebinding - CVE-2025-59159
- Regular Expression Denial of Service (ReDoS) in lodash - CVE-2020-28500
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-x5rq-j2xg-h7qm) - CVE-2019-1010266
- Tags:
- npm
- lodash
Anything's wrong? Let us know Last updated on August 12, 2025