VYPR
Critical severityNVD Advisory· Published Jul 25, 2019· Updated Aug 4, 2024

CVE-2019-10744

CVE-2019-10744

Description

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

lodash before 4.17.12 vulnerable to prototype pollution via defaultsDeep, allowing property injection on Object.prototype.

Vulnerability

Overview CVE-2019-10744 is a prototype pollution vulnerability in lodash versions prior to 4.17.12. The defaultsDeep function can be exploited by crafting an object with a constructor property that, when merged, pollutes Object.prototype, allowing attackers to add or modify properties of all JavaScript objects [1][4].

Exploitation

An attacker can supply a malicious JSON payload to a function that uses defaultsDeep to merge objects. No authentication is required if the application exposes an endpoint that accepts user-controlled objects for merging. The attack leverages JavaScript's prototype chain: because defaultsDeep recursively merges properties, a __proto__ or constructor.prototype key can be used to traverse to Object.prototype and inject arbitrary properties [2][4].

Impact

Successful exploitation can lead to property injection affecting the entire application. This can result in denial of service (by overriding critical properties), property tampering, or, in some contexts, remote code execution if the polluted properties influence subsequent operations [1][3][4]. Red Hat rated it as a moderate security issue in products like ovirt-web-ui [3].

Mitigation

The vulnerability is fixed in lodash version 4.17.12 [1][2]. Users should update to the latest version or apply the patch provided in the referenced pull request. No workarounds are available for older versions.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
lodashnpm
< 4.17.124.17.12
lodash-esnpm
< 4.17.144.17.14
lodash-amdnpm
< 4.17.134.17.13
lodash.defaultsdeepnpm
< 4.6.14.6.1
lodash-railsRubyGems
< 4.17.124.17.12

Affected products

6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.