{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13465","assignerOrgId":"ce714d77-add3-4f53-aff5-83d477b104bb","state":"PUBLISHED","assignerShortName":"openjs","dateReserved":"2025-11-20T02:16:12.128Z","datePublished":"2026-01-21T19:05:28.846Z","dateUpdated":"2026-01-21T19:43:38.268Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["https://github.com/lodash/lodash"],"packageName":"lodash","product":"Lodash","repo":"https://github.com/lodash/lodash","vendor":"Lodash","versions":[{"lessThanOrEqual":"4.17.22","status":"affected","version":"4.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","modules":["https://github.com/lodash/lodash"],"product":"Lodash-amd","repo":"https://github.com/lodash/lodash","vendor":"Lodash-amd","versions":[{"lessThanOrEqual":"4.17.22","status":"affected","version":"4.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","modules":["https://github.com/lodash/lodash"],"product":"lodash-es","repo":"https://github.com/lodash/lodash","vendor":"lodash-es","versions":[{"lessThanOrEqual":"4.17.22","status":"affected","version":"4.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","modules":["https://github.com/lodash/lodash"],"product":"lodash.unset","repo":"https://github.com/lodash/lodash","vendor":"lodash.unset","versions":[{"status":"affected","version":"4.0.0"}]}],"credits":[{"lang":"en","type":"finder","value":"Lukas Euler"},{"lang":"en","type":"analyst","value":"Jordan Harband"},{"lang":"en","type":"remediation reviewer","value":"Michał Lipiński"},{"lang":"en","type":"remediation developer","value":"Ulises Gascón"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the <code>_.unset</code>&nbsp;and <code>_.omit</code>&nbsp;functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.</p><p>The issue permits deletion of properties but does not allow overwriting their original behavior.</p><p>This issue is patched on 4.17.23</p><br>"}],"value":"Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23"}],"impacts":[{"capecId":"CAPEC-77","descriptions":[{"lang":"en","value":"CAPEC-77 Manipulating User-Controlled Variables"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"PROOF_OF_CONCEPT","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1321","description":"CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ce714d77-add3-4f53-aff5-83d477b104bb","shortName":"openjs","dateUpdated":"2026-01-21T19:05:28.846Z"},"references":[{"url":"https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"}],"source":{"advisory":"GHSA-xxjr-mmjv-4gpg","discovery":"EXTERNAL"},"title":"Prototype Pollution Vulnerability in Lodash _.unset and _.omit functions","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-21T19:43:10.513400Z","id":"CVE-2025-13465","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-21T19:43:38.268Z"}}]}}