Skip to content

Commit baa1193

Browse files
committed
1 parent 44f7775 commit baa1193

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

advisories/github-reviewed/2026/04/GHSA-f23m-r3pf-42rh/GHSA-f23m-r3pf-42rh.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f23m-r3pf-42rh",
4-
"modified": "2026-04-01T23:50:27Z",
4+
"modified": "2026-04-01T23:50:28Z",
55
"published": "2026-04-01T23:50:27Z",
66
"aliases": [
77
"CVE-2026-2950"
@@ -10,14 +10,14 @@
1010
"details": "### Impact\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the `_.unset` and `_.omit` functions. The fix for [CVE-2025-13465](https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as `Object.prototype`, `Number.prototype`, and `String.prototype`.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\n### Patches\n\nThis issue is patched in 4.18.0.\n\n### Workarounds\n\nNone. Upgrade to the patched version.",
1111
"severity": [
1212
{
13-
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:L/SA:N"
1515
}
1616
],
1717
"affected": [
1818
{
1919
"package": {
20-
"ecosystem": "npm",
20+
"ecosystem": "Packagist",
2121
"name": "lodash"
2222
},
2323
"ranges": [
@@ -39,7 +39,7 @@
3939
},
4040
{
4141
"package": {
42-
"ecosystem": "npm",
42+
"ecosystem": "RubyGems",
4343
"name": "lodash-es"
4444
},
4545
"ranges": [
@@ -61,7 +61,7 @@
6161
},
6262
{
6363
"package": {
64-
"ecosystem": "npm",
64+
"ecosystem": "Hex",
6565
"name": "lodash-amd"
6666
},
6767
"ranges": [

0 commit comments

Comments
 (0)