CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “lodash”

8 vulnerabilities found for “lodash”

CVE-2025-13465
MEDIUM5.3

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwriting their original behavior. This issue is patched on 4.17.23

lodash / lodash
Network
Published Jan 21, 2026
CVE-2020-28500
MEDIUM5.3

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.

lodash / lodash+41
Network
Published Feb 15, 2021
CVE-2021-23337
HIGH7.2

Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

lodash / lodash+47
Network
Published Feb 15, 2021
CVE-2020-8203
HIGH7.4

Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.

lodash / lodash+41
Network
Published Jul 15, 2020
CVE-2019-10744
CRITICAL9.1

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

f5 / big-ip_application_acceleration_manager+80
Network
Published Jul 26, 2019
CVE-2019-1010266
MEDIUM6.5

lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.

lodash / lodash
Network
Published Jul 17, 2019
CVE-2018-16487
MEDIUM5.6

A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.

lodash / lodash
Network
Published Feb 1, 2019
CVE-2018-3721
MEDIUM6.5

lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.

netapp / active_iq_unified_manager+4
Network
Published Jun 7, 2018