{"id":"CVE-2026-2950","summary":"lodash vulnerable to Prototype Pollution via array path bypass in `_.unset` and `_.omit`","details":"Impact:\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\nPatches:\n\nThis issue is patched in 4.18.0.\n\nWorkarounds:\n\nNone. Upgrade to the patched version.","aliases":["CVE-2025-13465","GHSA-f23m-r3pf-42rh","GHSA-xxjr-mmjv-4gpg"],"modified":"2026-05-18T05:59:45.591927890Z","published":"2026-03-31T19:18:35.796Z","related":["CGA-w8p3-8q8v-32x5"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/2xxx/CVE-2026-2950.json","cna_assigner":"openjs","cwe_ids":["CWE-1321"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/2xxx/CVE-2026-2950.json"},{"type":"ADVISORY","url":"https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2950"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lodash/lodash","events":[{"introduced":"d35a9c40beb594d09814ba7f7673b81d4d67a816"},{"fixed":"db27b6bb14b12a1451b20edf87dfe307b87a337d"}]}],"versions":["4.15.0-npm-packages","4.14.0-npm-packages","4.13.0-npm-packages","4.12.1-npm-packages","4.11.2-npm-packages","4.11.1-npm-packages","4.12.0-npm-packages","4.10.2-npm-packages","4.10.1-npm-packages","4.11.0-npm-packages","4.10.0-npm-packages","4.9.1-npm-packages","4.8.1-npm-packages","4.8.0-npm-packages","4.9.0-npm-packages","4.7.1-npm-packages","4.7.0-npm-packages","4.6.2-npm-packages","4.6.1-npm-packages","4.6.0-npm-packages","4.5.7-npm-packages","4.5.5-npm-packages","4.5.4-npm-packages","4.5.6-npm-packages","4.5.2-npm-packages","4.5.1-npm-packages","4.5.3-npm-packages","4.5.0-npm-packages","4.4.3-npm-packages","4.4.2-npm-packages","4.4.0-npm-packages","4.3.5-npm-packages","4.4.1-npm-packages","4.3.4-npm-packages","4.3.3-npm-packages","4.3.2-npm-packages","4.3.1-npm-packages","4.3.0-npm-packages","4.2.5-npm-packages","4.2.4-npm-packages","4.2.3-npm-packages","4.2.2-npm-packages","4.2.1-npm-packages","4.2.0-npm-packages","4.1.5-npm-packages","4.1.3-npm-packages","4.1.2-npm-packages","4.1.4-npm-packages","4.1.1-npm-packages","4.1.0-npm-packages","4.0.8-npm-packages","4.0.7-npm-packages","4.0.9-npm-packages","4.0.3-npm-packages","4.0.2-npm-packages","4.0.4-npm-packages","4.0.5-npm-packages","4.0.6-npm-packages","4.0.1-npm-packages","4.0.0-npm-packages"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-2950.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}]}