Skip to content

Build(deps): Bump lodash from 4.17.23 to 4.18.1#283

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/lodash-4.18.1
Open

Build(deps): Bump lodash from 4.17.23 to 4.18.1#283
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/npm_and_yarn/lodash-4.18.1

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github Apr 10, 2026

Bumps lodash from 4.17.23 to 4.18.1.

Release notes

Sourced from lodash's releases.

4.18.1

Bugs

Fixes a ReferenceError issue in lodash lodash-es lodash-amd and lodash.template when using the template and fromPairs functions from the modular builds. See lodash/lodash#6167

These defects were related to how lodash distributions are built from the main branch using https://github.com/lodash-archive/lodash-cli. When internal dependencies change inside lodash functions, equivalent updates need to be made to a mapping in the lodash-cli. (hey, it was ahead of its time once upon a time!). We know this, but we missed it in the last release. It's the kind of thing that passes in CI, but fails bc the build is not the same thing you tested.

There is no diff on main for this, but you can see the diffs for each of the npm packages on their respective branches:

4.18.0

v4.18.0

Full Changelog: lodash/lodash@4.17.23...4.18.0

Security

_.unset / _.omit: Fixed prototype pollution via constructor/prototype path traversal (GHSA-f23m-r3pf-42rh, fe8d32e). Previously, array-wrapped path segments and primitive roots could bypass the existing guards, allowing deletion of properties from built-in prototypes. Now constructor and prototype are blocked unconditionally as non-terminal path keys, matching baseSet. Calls that previously returned true and deleted the property now return false and leave the target untouched.

_.template: Fixed code injection via imports keys (GHSA-r5fr-rjxr-66jc, CVE-2026-4800, 879aaa9). Fixes an incomplete patch for CVE-2021-23337. The variable option was validated against reForbiddenIdentifierChars but importsKeys was left unguarded, allowing code injection via the same Function() constructor sink. imports keys containing forbidden identifier characters now throw "Invalid imports option passed into _.template".

Docs

  • Add security notice for _.template in threat model and API docs (#6099)
  • Document lower > upper behavior in _.random (#6115)
  • Fix quotes in _.compact jsdoc (#6090)

lodash.* modular packages

Diff

We have also regenerated and published a select number of the lodash.* modular packages.

These modular packages had fallen out of sync significantly from the minor/patch updates to lodash. Specifically, we have brought the following packages up to parity w/ the latest lodash release because they have had CVEs on them in the past:

Commits
  • cb0b9b9 release(patch): bump main to 4.18.1 (#6177)
  • 75535f5 chore: prune stale advisory refs (#6170)
  • 62e91bc docs: remove n_ Node.js < 6 REPL note from README (#6165)
  • 59be2de release(minor): bump to 4.18.0 (#6161)
  • af63457 fix: broken tests for _.template 879aaa9
  • 1073a76 fix: linting issues
  • 879aaa9 fix: validate imports keys in _.template
  • fe8d32e fix: block prototype pollution in baseUnset via constructor/prototype traversal
  • 18ba0a3 refactor(fromPairs): use baseAssignValue for consistent assignment (#6153)
  • b819080 ci: add dist sync validation workflow (#6137)
  • Additional commits viewable in compare view

@dependabot dependabot Bot added dependabot Dependabot issues and PRs npm Node.js issues and PRs labels Apr 10, 2026
@dependabot dependabot Bot requested a review from ncalteen as a code owner April 10, 2026 03:51
@dependabot dependabot Bot added dependabot Dependabot issues and PRs npm Node.js issues and PRs labels Apr 10, 2026
@github-actions
Copy link
Copy Markdown

github-actions Bot commented Apr 10, 2026

MegaLinter analysis: Error

Descriptor Linter Files Fixed Errors Warnings Elapsed time
✅ ACTION actionlint 5 0 0 0.25s
✅ JAVASCRIPT prettier 19 0 0 1.1s
✅ JSON npm-package-json-lint yes no no 1.34s
✅ JSON prettier 29 0 0 4.41s
✅ MARKDOWN markdownlint 10 0 0 1.42s
✅ REPOSITORY checkov yes no no 29.63s
✅ REPOSITORY gitleaks yes no no 2.13s
✅ REPOSITORY git_diff yes no no 0.03s
✅ REPOSITORY grype yes no no 67.46s
✅ REPOSITORY secretlint yes no no 1.44s
✅ REPOSITORY syft yes no no 4.77s
❌ REPOSITORY trivy yes 1 no 16.17s
✅ REPOSITORY trivy-sbom yes no no 4.62s
✅ REPOSITORY trufflehog yes no no 48.61s
✅ TYPESCRIPT prettier 108 0 0 3.71s
✅ YAML prettier 25 0 0 1.17s
✅ YAML yamllint 25 0 0 1.08s

Detailed Issues

❌ REPOSITORY / trivy - 1 error
2026-05-09T02:35:20Z	INFO	[vulndb] Need to update DB
2026-05-09T02:35:20Z	INFO	[vulndb] Downloading vulnerability DB...
2026-05-09T02:35:20Z	INFO	[vulndb] Downloading artifact...	repo="mirror.gcr.io/aquasec/trivy-db:2"
1.45 MiB / 92.41 MiB [>______________________________________________________________] 1.57% ? p/s ?14.45 MiB / 92.41 MiB [--------->___________________________________________________] 15.64% ? p/s ?39.18 MiB / 92.41 MiB [------------------------->___________________________________] 42.40% ? p/s ?65.41 MiB / 92.41 MiB [--------------------------------->_____________] 70.78% 106.46 MiB p/s ETA 0s91.14 MiB / 92.41 MiB [---------------------------------------------->] 98.63% 106.46 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 106.46 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 102.50 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 102.50 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [--------------------------------------------->] 100.00% 102.50 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 95.88 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 95.88 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 95.88 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 89.70 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 89.70 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 89.70 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 83.91 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 83.91 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 83.91 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 78.50 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 78.50 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 78.50 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 73.43 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 73.43 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 73.43 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 68.69 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 68.69 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 68.69 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 64.26 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [---------------------------------------------->] 100.00% 64.26 MiB p/s ETA 0s92.41 MiB / 92.41 MiB [-------------------------------------------------] 100.00% 16.47 MiB p/s 5.8s2026-05-09T02:35:27Z	INFO	[vulndb] Artifact successfully downloaded	repo="mirror.gcr.io/aquasec/trivy-db:2"
2026-05-09T02:35:27Z	INFO	[vuln] Vulnerability scanning is enabled
2026-05-09T02:35:27Z	INFO	[misconfig] Misconfiguration scanning is enabled
2026-05-09T02:35:27Z	INFO	[checks-client] Need to update the checks bundle
2026-05-09T02:35:27Z	INFO	[checks-client] Downloading the checks bundle...
234.65 KiB / 234.65 KiB [--------------------------------------------------------->] 100.00% ? p/s ?234.65 KiB / 234.65 KiB [-----------------------------------------------] 100.00% 4.49 MiB p/s 300ms2026-05-09T02:35:35Z	INFO	Suppressing dependencies for development and testing. To display them, try the '--include-dev-deps' flag.
2026-05-09T02:35:35Z	INFO	Number of language-specific files	num=1
2026-05-09T02:35:35Z	INFO	[npm] Detecting vulnerabilities...
2026-05-09T02:35:35Z	INFO	Detected config files	num=0

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │
├───────────────────┼──────┼─────────────────┼───────────────────┤
│ package-lock.json │ npm  │        5        │         -         │
└───────────────────┴──────┴─────────────────┴───────────────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 5 (UNKNOWN: 0, LOW: 0, MEDIUM: 4, HIGH: 1, CRITICAL: 0)

┌──────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬──────────────────────────────────────────────────────────────┐
│     Library      │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                            Title                             │
├──────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ brace-expansion  │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ brace-expansion: brace-expansion: Denial of Service via zero │
│                  │                │          │        │                   │                             │ step value in brace pattern...                               │
│                  │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750                   │
│                  │                │          │        ├───────────────────┤                             │                                                              │
│                  │                │          │        │ 2.0.2             │                             │                                                              │
│                  │                │          │        │                   │                             │                                                              │
│                  │                │          │        │                   │                             │                                                              │
├──────────────────┼────────────────┼──────────┤        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ fast-xml-builder │ CVE-2026-44665 │ HIGH     │        │ 1.1.4             │ 1.1.7                       │ fast-xml-builder allows attribute values with unwanted       │
│                  │                │          │        │                   │                             │ quotes to bypass malicious or unwanted...                    │
│                  │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-44665                   │
├──────────────────┼────────────────┼──────────┤        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ fast-xml-parser  │ CVE-2026-41650 │ MEDIUM   │        │ 5.5.7             │ 5.7.0                       │ fast-xml-parser XMLBuilder: XML Comment and CDATA Injection  │
│                  │                │          │        │                   │                             │ via Unescaped Delimiters                                     │
│                  │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-41650                   │
├──────────────────┼────────────────┤          │        ├───────────────────┼─────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ yaml             │ CVE-2026-33532 │          │        │ 2.8.2             │ 2.8.3, 1.10.3               │ yaml: yaml: Denial of Service via deeply nested YAML         │
│                  │                │          │        │                   │                             │ document parsing                                             │
│                  │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33532                   │
└──────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴──────────────────────────────────────────────────────────────┘

📣 Notices:
  - Version 0.70.0 of Trivy is now available, current version is 0.69.1

To suppress version checks, run Trivy scans with the --skip-version-check flag

See detailed reports in MegaLinter artifacts

MegaLinter is graciously provided by OX Security
Show us your support by starring ⭐ the repository

Bumps [lodash](https://github.com/lodash/lodash) from 4.17.23 to 4.18.1.
- [Release notes](https://github.com/lodash/lodash/releases)
- [Commits](lodash/lodash@4.17.23...4.18.1)

---
updated-dependencies:
- dependency-name: lodash
  dependency-version: 4.18.1
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot force-pushed the dependabot/npm_and_yarn/lodash-4.18.1 branch from 54f04ea to 9b0a8ce Compare May 9, 2026 02:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependabot Dependabot issues and PRs npm Node.js issues and PRs

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants