CVE-2025-13465
🔶 mediumSummary
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwriting their original behavior. This issue is patched on 4.17.23
CVSS Score
5.3
Medium
EPSS Score
0.0
Exploit Probability
Published Date
2026-01-21
First Seen: 2026-01-28
📊 Relative Risk Intelligence
This CVE is Lower Risk - more severe than 19.8% of all 317,883 vulnerabilities in our database.
#254,789
Below average severity
Severity Percentile
🎯 CISA SSVC Assessment Updated: Jan 21, 2026
🔍 Exploitation Status
None
No known exploits
⚙️ Automatable
YES
Can be exploited automatically
💥 Technical Impact
Partial
Limited system impact
🏆 Discovered By
Lukas Euler
Jordan Harband (analyst)
Michał Lipiński (remediation reviewer)
Ulises Gascón (remediation developer)
SSVC data provided by
CISA
Last Modified
2026-02-17
Source
NVD 🔗
CVSS Vector 3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS Vector 4.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE IDs (Weakness Types)