A modern JavaScript utility library delivering modularity, performance, & extras.

CVE History

CVEPublishedCVSS v2CVSS v3
CVE-2021-233377.2 HIGH6.5 MEDIUM
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
CVE-2020-285005.3 MEDIUM5 MEDIUM
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
CVE-2020-82037.4 HIGH5.8 MEDIUM
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
CVE-2019-10102666.5 MEDIUM4 MEDIUM
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.
CVE-2018-37216.5 MEDIUM4 MEDIUM
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.