Ad

CVE-2026-2950

MEDIUM CVSS 3.1: 5.3 EPSS 0.07%
Updated Apr 07, 2026
Lodash
Parameter Value
CVSS 5.3 (MEDIUM)
Affected Versions 4.0.0 — 4.17.23
Fixed In 4.18.0
Type CWE-1321 (Prototype Pollution)
Vendor Lodash
Public PoC No

Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.

The issue permits deletion of prototype properties but does not allow overwriting their original behavior. Patches: This issue is patched in 4.18.0. Workarounds: None.

Upgrade to the patched version.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 4

Configuration From (including) Up to (excluding)
Lodash Lodash
cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*
4.0.0 4.17.23
Lodash Lodash-Amd
cpe:2.3:a:lodash:lodash-amd:*:*:*:*:*:node.js:*:*
4.0.0 4.17.23
Lodash Lodash-Es
cpe:2.3:a:lodash:lodash-es:*:*:*:*:*:node.js:*:*
4.0.0 4.17.23
Lodash Lodash.Unset
cpe:2.3:a:lodash:lodash.unset:*:*:*:*:*:node.js:*:*
4.0.0

Related Vulnerabilities