Skip to content

fix(deps): update dependency lodash-es to v4.18.1 [security] - autoclosed#1772

Closed
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-lodash-es-vulnerability
Closed

fix(deps): update dependency lodash-es to v4.18.1 [security] - autoclosed#1772
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-lodash-es-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Jan 22, 2026

This PR contains the following updates:

Package Change Age Confidence
lodash-es (source) 4.17.214.18.1 age confidence

GitHub Vulnerability Alerts

CVE-2025-13465

Impact

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

Patches

This issue is patched on 4.17.23.

CVE-2026-2950

Impact

Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for CVE-2025-13465 only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.

The issue permits deletion of prototype properties but does not allow overwriting their original behavior.

Patches

This issue is patched in 4.18.0.

Workarounds

None. Upgrade to the patched version.

CVE-2026-4800

Impact

The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.

When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.

Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().

Patches

Users should upgrade to version 4.18.0.

The fix applies two changes:

  1. Validate importsKeys against the existing reForbiddenIdentifierChars regex (same check already used for the variable option)
  2. Replace assignInWith with assignWith when merging imports, so only own properties are enumerated

Workarounds

Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.


Release Notes

lodash/lodash (lodash-es)

v4.18.1

Compare Source

Bugs

Fixes a ReferenceError issue in lodash lodash-es lodash-amd and lodash.template when using the template and fromPairs functions from the modular builds. See #​6167 (comment)

These defects were related to how lodash distributions are built from the main branch using https://github.com/lodash-archive/lodash-cli. When internal dependencies change inside lodash functions, equivalent updates need to be made to a mapping in the lodash-cli. (hey, it was ahead of its time once upon a time!). We know this, but we missed it in the last release. It's the kind of thing that passes in CI, but fails bc the build is not the same thing you tested.

There is no diff on main for this, but you can see the diffs for each of the npm packages on their respective branches:

lodash: lodash/lodash@4.18.0-npm...4.18.1-npm
lodash-es: lodash/lodash@4.18.0-es...4.18.1-es
lodash-amd: lodash/lodash@4.18.0-amd...4.18.1-amd
lodash.templatelodash/lodash@4.18.0-npm-packages...4.18.1-npm-packages

v4.18.0

Compare Source

v4.18.0

Full Changelog: lodash/lodash@4.17.23...4.18.0

Security

_.unset / _.omit: Fixed prototype pollution via constructor/prototype path traversal (GHSA-f23m-r3pf-42rh, fe8d32e). Previously, array-wrapped path segments and primitive roots could bypass the existing guards, allowing deletion of properties from built-in prototypes. Now constructor and prototype are blocked unconditionally as non-terminal path keys, matching baseSet. Calls that previously returned true and deleted the property now return false and leave the target untouched.

_.template: Fixed code injection via imports keys (GHSA-r5fr-rjxr-66jc, CVE-2026-4800, 879aaa9). Fixes an incomplete patch for CVE-2021-23337. The variable option was validated against reForbiddenIdentifierChars but importsKeys was left unguarded, allowing code injection via the same Function() constructor sink. imports keys containing forbidden identifier characters now throw "Invalid imports option passed into _.template".

Docs
  • Add security notice for _.template in threat model and API docs (#​6099)
  • Document lower > upper behavior in _.random (#​6115)
  • Fix quotes in _.compact jsdoc (#​6090)
lodash.* modular packages

Diff

We have also regenerated and published a select number of the lodash.* modular packages.

These modular packages had fallen out of sync significantly from the minor/patch updates to lodash. Specifically, we have brought the following packages up to parity w/ the latest lodash release because they have had CVEs on them in the past:

v4.17.23

Compare Source

v4.17.22

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot added the dependencies Pull requests that update a dependency file label Jan 22, 2026
@safedep
Copy link
Copy Markdown

safedep Bot commented Jan 22, 2026

SafeDep Report Summary

Green Malicious Packages Badge Green Vulnerable Packages Badge Green Risky License Badge

Package Details
Package Malware Vulnerability Risky License Report
icon lodash-es @ 4.18.1
pnpm-lock.yaml
ok icon
ok icon
ok icon
🔗

View complete scan results →

This report is generated by SafeDep Github App

@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch from 3aecfa1 to 78dcd72 Compare January 23, 2026 18:26
@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch from 78dcd72 to f893da2 Compare February 2, 2026 17:50
@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch 2 times, most recently from 42bfec5 to 662bff7 Compare February 17, 2026 18:59
@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch from 662bff7 to f469065 Compare March 5, 2026 18:17
@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch 3 times, most recently from 657c486 to c56733c Compare March 15, 2026 11:34
@renovate renovate Bot changed the title fix(deps): update dependency lodash-es to v4.17.23 [security] fix(deps): update dependency lodash-es to v4.17.23 [security] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot deleted the renovate/npm-lodash-es-vulnerability branch March 27, 2026 01:16
@renovate renovate Bot changed the title fix(deps): update dependency lodash-es to v4.17.23 [security] - autoclosed fix(deps): update dependency lodash-es to v4.17.23 [security] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch 2 times, most recently from c56733c to 0427a9e Compare March 30, 2026 21:02
@renovate renovate Bot changed the title fix(deps): update dependency lodash-es to v4.17.23 [security] fix(deps): update dependency lodash-es to v4.18.1 [security] Apr 2, 2026
@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch 2 times, most recently from bfe4b3c to aed777f Compare April 5, 2026 02:27
@renovate renovate Bot force-pushed the renovate/npm-lodash-es-vulnerability branch from aed777f to 74462a8 Compare April 5, 2026 13:35
@github-actions
Copy link
Copy Markdown

github-actions Bot commented Apr 5, 2026

📦 Next.js Bundle Analysis for mx-kami

This analysis was generated by the Next.js Bundle Analysis action. 🤖

⚠️ Global Bundle Size Increased

Page Size (compressed)
global 220.37 KB (🟡 +8 B)
Details

The global bundle is the javascript bundle that loads alongside every page. It is in its own category because its impact is much higher - an increase to its size means that every page on your website loads slower, and a decrease means every page loads faster.

Any third party scripts you have added directly to your app using the <script> tag are not accounted for in this analysis

If you want further insight into what is behind the changes, give @next/bundle-analyzer a try!

Eight Pages Changed Size

The following pages changed size from the code in this PR compared to its base branch:

Page Size (compressed) First Load % of Budget (350 KB)
/[locale]/[page] 51.03 KB 271.4 KB 77.54% (+/- <0.01%)
/[locale]/friends 55.81 KB 276.18 KB 78.91% (+/- <0.01%)
/[locale]/notes/[id] 74.03 KB 294.4 KB 84.11% (+/- <0.01%)
/[locale]/posts 23.81 KB 244.18 KB 69.76% (+/- <0.01%)
/[locale]/posts/[category]/[slug] 78.46 KB 298.83 KB 85.38% (+/- <0.01%)
/[locale]/preview 54.91 KB 275.28 KB 78.65% (+/- <0.01%)
/[locale]/projects/[id] 50.17 KB 270.54 KB 77.30% (+/- <0.01%)
/[locale]/recently 95.53 KB 315.9 KB 90.26% (+/- <0.01%)
Details

Only the gzipped size is provided here based on an expert tip.

First Load is the size of the global bundle plus the bundle for the individual page. If a user were to show up to your website and land on a given page, the first load size represents the amount of javascript that user would need to download. If next/link is used, subsequent page loads would only need to download that page's bundle (the number in the "Size" column), since the global bundle has already been downloaded.

Any third party scripts you have added directly to your app using the <script> tag are not accounted for in this analysis

The "Budget %" column shows what percentage of your performance budget the First Load total takes up. For example, if your budget was 100kb, and a given page's first load size was 10kb, it would be 10% of your budget. You can also see how much this has increased or decreased compared to the base branch of your PR. If this percentage has increased by 20% or more, there will be a red status indicator applied, indicating that special attention should be given to this. If you see "+/- <0.01%" it means that there was a change in bundle size, but it is a trivial enough amount that it can be ignored.

@renovate renovate Bot changed the title fix(deps): update dependency lodash-es to v4.18.1 [security] fix(deps): update dependency lodash-es to v4.18.1 [security] - autoclosed Apr 12, 2026
@renovate renovate Bot closed this Apr 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants