Skip to content

⬆️ Updates lodash to v4.18.1 [SECURITY]#558

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-lodash-vulnerability
Open

⬆️ Updates lodash to v4.18.1 [SECURITY]#558
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-lodash-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Jan 22, 2026

This PR contains the following updates:

Package Change Age Confidence
lodash (source) 4.17.214.18.1 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Lodash has Prototype Pollution Vulnerability in _.unset and _.omit functions

CVE-2025-13465 / GHSA-xxjr-mmjv-4gpg

More information

Details

Impact

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

Patches

This issue is patched on 4.17.23.

Severity

  • CVSS Score: 6.9 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


lodash vulnerable to Code Injection via _.template imports key names

CVE-2026-4800 / GHSA-r5fr-rjxr-66jc

More information

Details

Impact

The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.

When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.

Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().

Patches

Users should upgrade to version 4.18.0.

The fix applies two changes:

  1. Validate importsKeys against the existing reForbiddenIdentifierChars regex (same check already used for the variable option)
  2. Replace assignInWith with assignWith when merging imports, so only own properties are enumerated
Workarounds

Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.

Severity

  • CVSS Score: 8.1 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


lodash vulnerable to Prototype Pollution via array path bypass in _.unset and _.omit

CVE-2026-2950 / GHSA-f23m-r3pf-42rh

More information

Details

Impact

Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for CVE-2025-13465 only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.

The issue permits deletion of prototype properties but does not allow overwriting their original behavior.

Patches

This issue is patched in 4.18.0.

Workarounds

None. Upgrade to the patched version.

Severity

  • CVSS Score: 6.5 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

lodash/lodash (lodash)

v4.18.1

Compare Source

v4.18.0

Compare Source

v4.17.23

Compare Source


Configuration

📅 Schedule: (in timezone Europe/Moscow)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Jan 22, 2026

Branch automerge failure

This PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.


  • Branch has one or more failed status checks

@auto-assign auto-assign Bot requested a review from AlexRogalskiy January 22, 2026 04:44
@github-actions
Copy link
Copy Markdown

Thanks for opening an issue! Make sure you've followed CONTRIBUTING.md.

@github-actions
Copy link
Copy Markdown

Hello from PR Helper

Remember to comment with one of the following states:

#pr-ready to enable all auto processing and merging.

#pr-onhold to prevent merging as you have other commits or discussions to make.

If you do not set the #pr-ready comment then the auto-merge capabilities will not be active.

@github-actions
Copy link
Copy Markdown

Thanks for the PR!

This section of the codebase is owner by https://github.com/AlexRogalskiy/ - if they write a comment saying "LGTM" then it will be merged.

@socket-security
Copy link
Copy Markdown

socket-security Bot commented Jan 22, 2026

All alerts resolved. Learn more about Socket for GitHub.

This PR previously contained dependency changes with security issues that have been resolved, removed, or ignored.

View full report

@renovate renovate Bot changed the title ⬆️ Updates lodash to v4.17.23 [SECURITY] ⬆️ Updates lodash to v4.17.23 [SECURITY] - autoclosed Jan 22, 2026
@renovate renovate Bot closed this Jan 22, 2026
@renovate renovate Bot deleted the renovate/npm-lodash-vulnerability branch January 22, 2026 14:01
@renovate renovate Bot changed the title ⬆️ Updates lodash to v4.17.23 [SECURITY] - autoclosed ⬆️ Updates lodash to v4.17.23 [SECURITY] Jan 22, 2026
@renovate renovate Bot reopened this Jan 22, 2026
@renovate renovate Bot force-pushed the renovate/npm-lodash-vulnerability branch 2 times, most recently from 0a483f0 to d31d132 Compare January 22, 2026 17:36
Copy link
Copy Markdown

@github-actions github-actions Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Scan Summary

Tool Critical High Medium Low Status
Security Audit for Infrastructure 0 0 0 6

Recommendation

Looks good ✔️

@renovate renovate Bot force-pushed the renovate/npm-lodash-vulnerability branch from d31d132 to bdbdaef Compare March 12, 2026 00:37
@renovate renovate Bot changed the title ⬆️ Updates lodash to v4.17.23 [SECURITY] ⬆️ Updates lodash to v4.17.23 [SECURITY] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot changed the title ⬆️ Updates lodash to v4.17.23 [SECURITY] - autoclosed ⬆️ Updates lodash to v4.17.23 [SECURITY] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/npm-lodash-vulnerability branch from bdbdaef to 41fcb43 Compare March 30, 2026 21:11
@renovate renovate Bot changed the title ⬆️ Updates lodash to v4.17.23 [SECURITY] ⬆️ Updates lodash to v4.17.23 [SECURITY] - autoclosed Mar 31, 2026
@renovate renovate Bot closed this Mar 31, 2026
@renovate renovate Bot changed the title ⬆️ Updates lodash to v4.17.23 [SECURITY] - autoclosed ⬆️ Updates lodash to v4.17.23 [SECURITY] Apr 1, 2026
@renovate renovate Bot reopened this Apr 1, 2026
@renovate renovate Bot force-pushed the renovate/npm-lodash-vulnerability branch from 41fcb43 to ad6e2c8 Compare April 1, 2026 14:13
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 1, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addedlodash@​4.18.1761008792100

View full report

Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate Bot changed the title ⬆️ Updates lodash to v4.17.23 [SECURITY] ⬆️ Updates lodash to v4.18.1 [SECURITY] Apr 3, 2026
@renovate renovate Bot force-pushed the renovate/npm-lodash-vulnerability branch from ad6e2c8 to 0f1ce6f Compare April 3, 2026 05:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants