Multiple vulnerabilities have been discovered in lodash, a popular utility library for Node.js. These vulnerabilities include code injection via `_.template` and prototype pollution via `_.unset` and `_.omit`. Users who pass untrusted input to these functions are at risk. Version 4.18.0 contains patches for these issues.
The highest CVSS score is 8.1, indicating a high-severity vulnerability.
What is Lodash?
It is widely used in Node.js and browser environments to perform common programming tasks more efficiently. Lodash offers a range of functions for tasks like mapping, filtering, and reducing data. For more information, you can search all lodash CVEs.
CVE-2026-4800: Code Injection in `_.template`
High severity: Exploitable code execution with potential for significant impact.
Exploit Prediction Scoring System (EPSS) score of 0.068 indicates a low probability of exploitation.
Untrusted input passed as key names in `options.imports` to `_.template` can lead to code injection. An attacker can inject default-parameter expressions, executing arbitrary code during template compilation.
How to fix CVE-2026-4800 in Lodash
Patch immediately- 1.Update lodash to version 4.18.0 or later.
npm update lodashWorkaround: Do not pass untrusted input as key names in `options.imports`. Only use developer-controlled, static key names.
NextGuard automatically flags CVE-2026-4800 if lodash appears in any of your monitored projects — no manual lookup required.
CVE-2026-2950: Prototype Pollution in `_.unset` and `_.omit`
Medium severity: Limited impact, but potential for denial of service.
Exploit Prediction Scoring System (EPSS) score of 0.042 indicates a low probability of exploitation.
The `_.unset` and `_.omit` functions are vulnerable to prototype pollution due to insufficient input validation. An attacker can bypass previous security measures by using array-wrapped path segments to delete properties from built-in prototypes.
How to fix CVE-2026-2950 in Lodash
Patch immediately- 1.Update lodash to version 4.18.0 or later.
npm update lodashWorkaround: None. Upgrade to the patched version.
Stay ahead of Node.js vulnerabilities
Proactively identify and remediate vulnerabilities in your Node.js projects. Use NextGuard to monitor your nodejs dependencies and receive alerts on new CVEs.
Compare PlansFrequently asked questions
Update lodash to version 4.18.0 to address these critical security vulnerabilities. Regularly see all nodejs vulnerabilities to ensure your applications remain secure. Prioritize patching to mitigate potential risks.
Related topics