📂 Vulnerable Library - test-utils-1.3.6.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-2026-4800 |
🔴 High |
8.1 |
Not Defined |
< 1% |
lodash-4.17.21.tgz |
Direct |
N/A |
❌ |
Unreachable |
| CVE-2025-13465 |
🔴 High |
7.2 |
Not Defined |
< 1% |
lodash-4.17.21.tgz |
Direct |
N/A |
❌ |
Reachable |
| CVE-2026-2950 |
🟠 Medium |
6.5 |
Not Defined |
< 1% |
lodash-4.17.21.tgz |
Direct |
lodash-es - 4.17.23,lodash - 4.17.23,lodash-amd - 4.17.23 |
✅ |
Unreachable |
| CVE-2024-6783 |
🟠 Medium |
4.8 |
Not Defined |
< 1% |
vue-2.7.14.tgz |
Direct |
no_fix |
✅ |
Reachable |
| CVE-2024-6783 |
🟠 Medium |
4.8 |
Not Defined |
< 1% |
vue-template-compiler-2.7.14.tgz |
Direct |
no_fix |
✅ |
Unreachable |
| CVE-2024-9506 |
🟡 Low |
3.7 |
Not Defined |
< 1% |
vue-2.7.14.tgz |
Direct |
vue - 3.0.0 |
✅ |
Reachable |
| CVE-2024-9506 |
🟡 Low |
3.7 |
Not Defined |
< 1% |
vue-template-compiler-2.7.14.tgz |
Direct |
vue - 3.0.0 |
✅ |
Unreachable |
Details
🔴CVE-2026-4800
Vulnerable Library - lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
-
❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-dev-server-3.11.3.tgz (Root Library)
- portfinder-1.0.28.tgz
- async-2.6.3.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
mocha-7.2.0.tgz (Root Library)
- yargs-unparser-1.6.0.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
admin-extension-sdk-3.0.15.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
optimize-css-assets-webpack-plugin-5.0.8.tgz (Root Library)
- last-call-webpack-plugin-3.0.0.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-merge-4.2.2.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
e2e-testsuite-platform-7.0.5.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cli-0.11.0.tgz (Root Library)
- inquirer-6.5.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-plugin-injector-1.0.7.tgz (Root Library)
- webpack-merge-4.2.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cli-0.9.0.tgz (Root Library)
- inquirer-6.5.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
admin-extension-sdk-3.0.13.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
test-utils-1.3.6.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cypress-multi-reporters-1.6.2.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cypress-3.1.2.tgz (Root Library)
- cypress-12.17.4.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-bundle-analyzer-3.9.0.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
lighthouse-9.6.8.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Impact:
The fix for CVE-2021-23337 (GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.
Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
Patches:
Users should upgrade to version 4.18.0.
Workarounds:
Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.
Publish Date: Mar 31, 2026 07:25 PM
URL: CVE-2026-4800
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2025-13465
Vulnerable Library - lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
-
❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-dev-server-3.11.3.tgz (Root Library)
- portfinder-1.0.28.tgz
- async-2.6.3.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
mocha-7.2.0.tgz (Root Library)
- yargs-unparser-1.6.0.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
admin-extension-sdk-3.0.15.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
optimize-css-assets-webpack-plugin-5.0.8.tgz (Root Library)
- last-call-webpack-plugin-3.0.0.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-merge-4.2.2.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
e2e-testsuite-platform-7.0.5.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cli-0.11.0.tgz (Root Library)
- inquirer-6.5.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-plugin-injector-1.0.7.tgz (Root Library)
- webpack-merge-4.2.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cli-0.9.0.tgz (Root Library)
- inquirer-6.5.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
admin-extension-sdk-3.0.13.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
test-utils-1.3.6.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cypress-multi-reporters-1.6.2.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cypress-3.1.2.tgz (Root Library)
- cypress-12.17.4.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-bundle-analyzer-3.9.0.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
lighthouse-9.6.8.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- administration-1.0.0/src/module/sw-settings/component/sw-system-config/sw-system-config.spec.vue3.js (Application)
-> ❌ lodash-4.17.21/lodash.js (Vulnerable Component)
Vulnerability Details
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23
Publish Date: Jan 21, 2026 07:05 PM
URL: CVE-2025-13465
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.2
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2026-2950
Vulnerable Library - lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
-
❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-dev-server-3.11.3.tgz (Root Library)
- portfinder-1.0.28.tgz
- async-2.6.3.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
mocha-7.2.0.tgz (Root Library)
- yargs-unparser-1.6.0.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
admin-extension-sdk-3.0.15.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
optimize-css-assets-webpack-plugin-5.0.8.tgz (Root Library)
- last-call-webpack-plugin-3.0.0.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-merge-4.2.2.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
e2e-testsuite-platform-7.0.5.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cli-0.11.0.tgz (Root Library)
- inquirer-6.5.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-plugin-injector-1.0.7.tgz (Root Library)
- webpack-merge-4.2.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cli-0.9.0.tgz (Root Library)
- inquirer-6.5.2.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
admin-extension-sdk-3.0.13.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
test-utils-1.3.6.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cypress-multi-reporters-1.6.2.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
cypress-3.1.2.tgz (Root Library)
- cypress-12.17.4.tgz
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
webpack-bundle-analyzer-3.9.0.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
-
lighthouse-9.6.8.tgz (Root Library)
- ❌ lodash-4.17.21.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Impact:
Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.
The issue permits deletion of prototype properties but does not allow overwriting their original behavior.
Patches:
This issue is patched in 4.18.0.
Workarounds:
None. Upgrade to the patched version.
Publish Date: Mar 31, 2026 07:18 PM
URL: CVE-2026-2950
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-xxjr-mmjv-4gpg
Release Date: Mar 31, 2026 07:18 PM
Fix Resolution : lodash-es - 4.17.23,lodash - 4.17.23,lodash-amd - 4.17.23
🟠CVE-2024-6783
Vulnerable Library - vue-2.7.14.tgz
Reactive, component-oriented view layer for modern web interfaces.
Library home page: https://registry.npmjs.org/vue/-/vue-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
-
vuex-3.6.2.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vue-3.3.4.tgz (Root Library)
- server-renderer-3.3.4.tgz
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
❌ vue-2.7.14.tgz (Vulnerable Library)
-
test-utils-1.3.6.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vue-router-4.2.2.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vue-i18n-9.2.2.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
compat-3.3.4.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vuex-4.1.0.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
test-utils-2.3.2.tgz (Root Library)
- server-renderer-3.3.4.tgz
- ❌ vue-2.7.14.tgz (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- administration-1.0.0/src/viewRenderer.ts (Application)
-> ❌ vue-2.7.14/dist/vue.runtime.common.js (Vulnerable Component)
Vulnerability Details
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as "Object.prototype.staticClass" or "Object.prototype.staticStyle" to execute arbitrary JavaScript code.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jul 23, 2024 03:05 PM
URL: CVE-2024-6783
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-6783
Release Date: Jul 23, 2024 03:05 PM
Fix Resolution : no_fix
🟠CVE-2024-6783
Vulnerable Library - vue-template-compiler-2.7.14.tgz
template compiler for Vue 2.0
Library home page: https://registry.npmjs.org/vue-template-compiler/-/vue-template-compiler-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
-
❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
-
test-utils-1.3.6.tgz (Root Library)
- ❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
-
fork-ts-checker-webpack-plugin-6.5.3.tgz (Root Library)
- ❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as "Object.prototype.staticClass" or "Object.prototype.staticStyle" to execute arbitrary JavaScript code.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jul 23, 2024 03:05 PM
URL: CVE-2024-6783
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-6783
Release Date: Jul 23, 2024 03:05 PM
Fix Resolution : no_fix
🟡CVE-2024-9506
Vulnerable Library - vue-2.7.14.tgz
Reactive, component-oriented view layer for modern web interfaces.
Library home page: https://registry.npmjs.org/vue/-/vue-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
-
vuex-3.6.2.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vue-3.3.4.tgz (Root Library)
- server-renderer-3.3.4.tgz
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
❌ vue-2.7.14.tgz (Vulnerable Library)
-
test-utils-1.3.6.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vue-router-4.2.2.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vue-i18n-9.2.2.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
compat-3.3.4.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
vuex-4.1.0.tgz (Root Library)
- ❌ vue-2.7.14.tgz (Vulnerable Library)
-
test-utils-2.3.2.tgz (Root Library)
- server-renderer-3.3.4.tgz
- ❌ vue-2.7.14.tgz (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- administration-1.0.0/src/viewRenderer.ts (Application)
- vue-2.7.14/dist/vue.runtime.common.js (Extension)
-> ❌ vue-2.7.14/dist/vue.runtime.common.prod.js (Vulnerable Component)
Vulnerability Details
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Publish Date: Oct 15, 2024 03:40 PM
URL: CVE-2024-9506
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 3.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-5j4c-8p2g-v4jx
Release Date: Oct 15, 2024 03:40 PM
Fix Resolution : vue - 3.0.0
🟡CVE-2024-9506
Vulnerable Library - vue-template-compiler-2.7.14.tgz
template compiler for Vue 2.0
Library home page: https://registry.npmjs.org/vue-template-compiler/-/vue-template-compiler-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
-
❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
-
test-utils-1.3.6.tgz (Root Library)
- ❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
-
fork-ts-checker-webpack-plugin-6.5.3.tgz (Root Library)
- ❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Publish Date: Oct 15, 2024 03:40 PM
URL: CVE-2024-9506
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 3.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-5j4c-8p2g-v4jx
Release Date: Oct 15, 2024 03:40 PM
Fix Resolution : vue - 3.0.0
📂 Vulnerable Library - test-utils-1.3.6.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Findings
Details
🔴CVE-2026-4800
Vulnerable Library - lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
❌ lodash-4.17.21.tgz (Vulnerable Library)
webpack-dev-server-3.11.3.tgz (Root Library)
mocha-7.2.0.tgz (Root Library)
admin-extension-sdk-3.0.15.tgz (Root Library)
optimize-css-assets-webpack-plugin-5.0.8.tgz (Root Library)
webpack-merge-4.2.2.tgz (Root Library)
e2e-testsuite-platform-7.0.5.tgz (Root Library)
cli-0.11.0.tgz (Root Library)
webpack-plugin-injector-1.0.7.tgz (Root Library)
cli-0.9.0.tgz (Root Library)
admin-extension-sdk-3.0.13.tgz (Root Library)
test-utils-1.3.6.tgz (Root Library)
cypress-multi-reporters-1.6.2.tgz (Root Library)
cypress-3.1.2.tgz (Root Library)
webpack-bundle-analyzer-3.9.0.tgz (Root Library)
lighthouse-9.6.8.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Impact:
The fix for CVE-2021-23337 (GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.
Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
Patches:
Users should upgrade to version 4.18.0.
Workarounds:
Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.
Publish Date: Mar 31, 2026 07:25 PM
URL: CVE-2026-4800
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2025-13465
Vulnerable Library - lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
❌ lodash-4.17.21.tgz (Vulnerable Library)
webpack-dev-server-3.11.3.tgz (Root Library)
mocha-7.2.0.tgz (Root Library)
admin-extension-sdk-3.0.15.tgz (Root Library)
optimize-css-assets-webpack-plugin-5.0.8.tgz (Root Library)
webpack-merge-4.2.2.tgz (Root Library)
e2e-testsuite-platform-7.0.5.tgz (Root Library)
cli-0.11.0.tgz (Root Library)
webpack-plugin-injector-1.0.7.tgz (Root Library)
cli-0.9.0.tgz (Root Library)
admin-extension-sdk-3.0.13.tgz (Root Library)
test-utils-1.3.6.tgz (Root Library)
cypress-multi-reporters-1.6.2.tgz (Root Library)
cypress-3.1.2.tgz (Root Library)
webpack-bundle-analyzer-3.9.0.tgz (Root Library)
lighthouse-9.6.8.tgz (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23
Publish Date: Jan 21, 2026 07:05 PM
URL: CVE-2025-13465
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.2
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2026-2950
Vulnerable Library - lodash-4.17.21.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
❌ lodash-4.17.21.tgz (Vulnerable Library)
webpack-dev-server-3.11.3.tgz (Root Library)
mocha-7.2.0.tgz (Root Library)
admin-extension-sdk-3.0.15.tgz (Root Library)
optimize-css-assets-webpack-plugin-5.0.8.tgz (Root Library)
webpack-merge-4.2.2.tgz (Root Library)
e2e-testsuite-platform-7.0.5.tgz (Root Library)
cli-0.11.0.tgz (Root Library)
webpack-plugin-injector-1.0.7.tgz (Root Library)
cli-0.9.0.tgz (Root Library)
admin-extension-sdk-3.0.13.tgz (Root Library)
test-utils-1.3.6.tgz (Root Library)
cypress-multi-reporters-1.6.2.tgz (Root Library)
cypress-3.1.2.tgz (Root Library)
webpack-bundle-analyzer-3.9.0.tgz (Root Library)
lighthouse-9.6.8.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Impact:
Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.
The issue permits deletion of prototype properties but does not allow overwriting their original behavior.
Patches:
This issue is patched in 4.18.0.
Workarounds:
None. Upgrade to the patched version.
Publish Date: Mar 31, 2026 07:18 PM
URL: CVE-2026-2950
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-xxjr-mmjv-4gpg
Release Date: Mar 31, 2026 07:18 PM
Fix Resolution : lodash-es - 4.17.23,lodash - 4.17.23,lodash-amd - 4.17.23
🟠CVE-2024-6783
Vulnerable Library - vue-2.7.14.tgz
Reactive, component-oriented view layer for modern web interfaces.
Library home page: https://registry.npmjs.org/vue/-/vue-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
vuex-3.6.2.tgz (Root Library)
vue-3.3.4.tgz (Root Library)
❌ vue-2.7.14.tgz (Vulnerable Library)
test-utils-1.3.6.tgz (Root Library)
vue-router-4.2.2.tgz (Root Library)
vue-i18n-9.2.2.tgz (Root Library)
compat-3.3.4.tgz (Root Library)
vuex-4.1.0.tgz (Root Library)
test-utils-2.3.2.tgz (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as "Object.prototype.staticClass" or "Object.prototype.staticStyle" to execute arbitrary JavaScript code.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jul 23, 2024 03:05 PM
URL: CVE-2024-6783
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-6783
Release Date: Jul 23, 2024 03:05 PM
Fix Resolution : no_fix
🟠CVE-2024-6783
Vulnerable Library - vue-template-compiler-2.7.14.tgz
template compiler for Vue 2.0
Library home page: https://registry.npmjs.org/vue-template-compiler/-/vue-template-compiler-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
test-utils-1.3.6.tgz (Root Library)
fork-ts-checker-webpack-plugin-6.5.3.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as "Object.prototype.staticClass" or "Object.prototype.staticStyle" to execute arbitrary JavaScript code.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jul 23, 2024 03:05 PM
URL: CVE-2024-6783
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-6783
Release Date: Jul 23, 2024 03:05 PM
Fix Resolution : no_fix
🟡CVE-2024-9506
Vulnerable Library - vue-2.7.14.tgz
Reactive, component-oriented view layer for modern web interfaces.
Library home page: https://registry.npmjs.org/vue/-/vue-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
vuex-3.6.2.tgz (Root Library)
vue-3.3.4.tgz (Root Library)
❌ vue-2.7.14.tgz (Vulnerable Library)
test-utils-1.3.6.tgz (Root Library)
vue-router-4.2.2.tgz (Root Library)
vue-i18n-9.2.2.tgz (Root Library)
compat-3.3.4.tgz (Root Library)
vuex-4.1.0.tgz (Root Library)
test-utils-2.3.2.tgz (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Publish Date: Oct 15, 2024 03:40 PM
URL: CVE-2024-9506
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 3.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-5j4c-8p2g-v4jx
Release Date: Oct 15, 2024 03:40 PM
Fix Resolution : vue - 3.0.0
🟡CVE-2024-9506
Vulnerable Library - vue-template-compiler-2.7.14.tgz
template compiler for Vue 2.0
Library home page: https://registry.npmjs.org/vue-template-compiler/-/vue-template-compiler-2.7.14.tgz
Path to dependency file: /src/Administration/Resources/app/administration/package.json
Dependency Hierarchy:
❌ vue-template-compiler-2.7.14.tgz (Vulnerable Library)
test-utils-1.3.6.tgz (Root Library)
fork-ts-checker-webpack-plugin-6.5.3.tgz (Root Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Publish Date: Oct 15, 2024 03:40 PM
URL: CVE-2024-9506
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 3.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-5j4c-8p2g-v4jx
Release Date: Oct 15, 2024 03:40 PM
Fix Resolution : vue - 3.0.0