Description
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The functions pick
, set
, setWith
, update
, updateWith
, and zipObjectDeep
allow a malicious user to modify the prototype of Object if the property identifiers are user-supplied.
Recommendation
No fix is available yet. Followings are affected versions:
- >= 3.7.0, <= 4.3.2
References
- GHSA-p6mc-m468-83gw
- hackerone.com
- security.netapp.com
- CVE-2020-8203
- CWE-1321
- CWE-770
- CAPEC-310
- OWASP 2021-A6
Related Issues
- Prototype Pollution in lodash (GHSA-p6mc-m468-83gw) 5 - CVE-2020-8203
- Prototype Pollution in lodash (GHSA-p6mc-m468-83gw) 2 - CVE-2020-8203
- IPX Allows Path Traversal via Prefix Matching Bypass - CVE-2025-54387
- Parse Server exposes the data schema via GraphQL API - CVE-2025-53364
- Tags:
- npm
- lodash.set
Anything's wrong? Let us know Last updated on August 12, 2025