Description
All versions of smart-extend are vulnerable to Prototype Pollution. The deep() function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
Recommendation
No fix is available yet. Followings are affected versions:
- >= 0
References
Related Issues
- Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions - CVE-2025-13465
- Prototype Pollution in lodash.merge (GHSA-h726-x36v-rx45) - Vulnerability
- Prototype Pollution in lodash.mergewith (GHSA-5947-m4fg-xhqg) - Vulnerability
- Prototype Pollution in lodash.mergewith - Vulnerability
- Tags:
- npm
- smart-extend
Anything's wrong? Let us know Last updated on January 09, 2023