-
Notifications
You must be signed in to change notification settings - Fork 7
chore(deps): Add lodash-es override to address vulnerability CVE-2025-13465 #305
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
📝 WalkthroughWalkthroughAdded an override in package.json: "lodash-es": "^4.17.23". The preceding override entry for "tar@<7.5.4": "7.5.4" was given a trailing comma to keep JSON valid. This is a dependency-resolution configuration change. 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. Warning Review ran into problems🔥 ProblemsErrors were encountered while retrieving linked issues. Errors (1)
Comment |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #305 +/- ##
===========================
===========================
🚀 New features to boost your workflow:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
🤖 Fix all issues with AI agents
In `@package.json`:
- Around line 2879-2880: Update the lodash-es dependency to ensure
CVE-2025-13465 is addressed by pinning or tightening the range: change
"lodash-es": "^4.17.23" in package.json to at least 4.17.23 (or to the exact
"4.17.23" if your policy requires deterministic pinning) so the patched version
that fixes prototype pollution in _.unset and _.omit is used.
Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.