[2.x] Bump lodash-es from 4.17.3 to 4.18.1#3042
Merged
pascalbaljet merged 1 commit intoinertiajs:2.xfrom Apr 7, 2026
Merged
Conversation
Member
|
Thanks! |
Author
|
Good morning @pascalbaljet, I have a question: when will it be available on npm? The latest version available is .18, and I see you're currently on .20 in the repository. |
Member
|
@danielperez9430 I'll tag a new release today. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
lodash vulnerable to Code Injection via
_.templateimports key namesDescription
The fix for CVE-2026-4800 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.
Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
Severity: High
CVSS: v3.1 - 8.1
Report type: Dependency Scanning
Scanner: GitLab SBoM Vulnerability Scanner
Links
Solution Upgrade to version 4.18.0 or above.