Lodash Security Alert: Prototype Pollution Vulnerability in `_.unset` and `_.omit` (CVE-2025-13465)
A critical security vulnerability has been disclosed in the widely-used JavaScript utility library Lodash, affecting versions 4.0.0 through 4.17.22. The flaw, tracked as CVE-2025-13465, resides in the `_.unset` and `_.omit` functions and enables prototype pollution. This allows an attacker to pass specially crafted paths that cause Lodash to delete methods from global prototypes, potentially destabilizing applications and enabling further exploitation.
The vulnerability specifically permits the deletion of properties from global prototypes, a form of prototype pollution that can lead to denial-of-service conditions or serve as a stepping stone for more severe attacks. The issue was addressed in the latest release, version 4.18.1, which patches the flaw. The update was flagged as a security priority in automated dependency management systems like Renovate, highlighting the urgency for developers to upgrade from the vulnerable versions.
Given Lodash's near-ubiquitous presence in the Node.js and front-end JavaScript ecosystems, this vulnerability poses a significant supply chain risk. Millions of projects depend on this library, making prompt patching essential to prevent potential exploitation. The advisory from the Lodash maintainers underscores the need for immediate action, as the flaw could be leveraged to manipulate application behavior in unforeseen ways, impacting security and stability across countless web services and applications.