Description
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_misc
https://hackerone.com/reports/310443
Patch x_refsource_misc
https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190919-0004/
Scores
CVSS v3
6.5
EPSS
0.0025
EPSS Percentile
48.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-1321
CWE-471
Status
published
Products (5)
lodash/lodash
< 4.17.5
netapp/active_iq_unified_manager
(3 CPE variants)
netapp/system_manager
9.0
npm/lodash
0 - 4.17.5npm
rubygems/lodash-rails
0 - 4.17.5RubyGems
Published
Jun 07, 2018
Tracked Since
Feb 18, 2026