-
Notifications
You must be signed in to change notification settings - Fork 73
Description
CVE-2025-13465 - Critical Severity Vulnerability
Vulnerable Libraries - lodash-es-4.17.22.tgz, lodash-4.17.21.tgz
lodash-es-4.17.22.tgz
Lodash exported as ES modules.
Library home page: https://registry.npmjs.org/lodash-es/-/lodash-es-4.17.22.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/node_modules/.pnpm/lodash-es@4.17.22/node_modules/lodash-es/package.json
Dependency Hierarchy:
- @postgres.ai/ce-4.0.3.tgz (Root Library)
- yup-0.32.11.tgz
- ❌ lodash-es-4.17.22.tgz (Vulnerable Library)
- yup-0.32.11.tgz
lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/node_modules/.pnpm/lodash@4.17.21/node_modules/lodash/package.json
Dependency Hierarchy:
- shared-4.0.2.tgz (Root Library)
- craco-7.1.0.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
- craco-7.1.0.tgz
Found in base branch: master
Vulnerability Details
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23
Publish Date: 2026-01-21
URL: CVE-2025-13465
CVSS 3 Score Details (9.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-xxjr-mmjv-4gpg
Release Date: 2026-01-21
Fix Resolution: lodash-amd - 4.17.23,lodash - 4.17.23,lodash-es - 4.17.23
Step up your Open Source Security Game with Mend here