The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwriting their original behavior. This issue is patched on 4.17.23 | |
| Title | Prototype Pollution Vulnerability in Lodash _.unset and _.omit functions | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: openjs
Published:
Updated: 2026-01-21T19:43:38.268Z
Reserved: 2025-11-20T02:16:12.128Z
Link: CVE-2025-13465
Updated: 2026-01-21T19:43:23.093Z
Status : Received
Published: 2026-01-21T20:16:05.250
Modified: 2026-01-21T20:16:05.250
Link: CVE-2025-13465
No data.
OpenCVE Enrichment
No data.