The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-8203

CVE-2020-8203: Lodash Prototype Pollution Vulnerability

CVE-2020-8203 is a prototype pollution vulnerability in Lodash affecting the _.zipObjectDeep function in versions before 4.17.20. This article covers the technical details, affected versions, and mitigation strategies.

Published: March 4, 2026

CVE-2020-8203 Overview

CVE-2020-8203 is a prototype pollution vulnerability affecting the popular JavaScript utility library Lodash. The vulnerability exists in the _.zipObjectDeep function in Lodash versions prior to 4.17.20. Prototype pollution attacks allow an attacker to inject properties into JavaScript Object prototypes, which can lead to property injection, denial of service, or in some cases remote code execution depending on how the application processes objects.

This vulnerability is particularly concerning due to Lodash's widespread use as a dependency in Node.js applications and front-end JavaScript projects. Thousands of applications rely on Lodash for common utility functions, making this a supply chain security concern with significant downstream impact.

Critical Impact

Attackers can manipulate object prototypes to inject malicious properties, potentially leading to unauthorized data modification or application denial of service across all objects in the JavaScript runtime.

Affected Products

  • Lodash versions prior to 4.17.20
  • Oracle Banking Corporate Lending Process Management (versions 14.2.0, 14.3.0, 14.5.0)
  • Oracle Banking Credit Facilities Process Management (versions 14.2.0, 14.3.0, 14.5.0)
  • Oracle Banking Extensibility Workbench (versions 14.2.0, 14.3.0, 14.5.0)
  • Oracle Banking Liquidity Management (versions 14.2.0, 14.3.0, 14.5.0)
  • Oracle Banking Supply Chain Finance (versions 14.2.0, 14.3.0, 14.5.0)
  • Oracle Banking Trade Finance Process Management (versions 14.2.0, 14.3.0, 14.5.0)
  • Oracle Banking Virtual Account Management (versions 14.2.0, 14.3.0, 14.5.0)
  • Oracle Blockchain Platform
  • Oracle Communications Billing and Revenue Management
  • Oracle Communications Cloud Native Core Policy
  • Oracle Communications Session Border Controller
  • Oracle Communications Session Router
  • Oracle Enterprise Communications Broker
  • Oracle JD Edwards EnterpriseOne Tools
  • Oracle PeopleSoft Enterprise PeopleTools (versions 8.58, 8.59)
  • Oracle Primavera Gateway

Discovery Timeline

  • 2020-07-15 - CVE-2020-8203 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2020-8203

Vulnerability Analysis

Prototype pollution is a JavaScript-specific vulnerability class that exploits the language's prototype-based inheritance model. In JavaScript, all objects inherit properties from their prototype chain, with Object.prototype sitting at the top. When an attacker can modify Object.prototype, those malicious properties become accessible on all objects within the application.

The vulnerability in Lodash's _.zipObjectDeep function allows attackers to supply crafted input that pollutes the Object.prototype. The function is designed to create objects from arrays of paths and values, supporting deep property paths using dot notation or bracket syntax. However, it fails to properly sanitize input paths that reference prototype properties like __proto__ or constructor.prototype.

When user-controlled data is passed to _.zipObjectDeep without proper validation, an attacker can inject paths such as __proto__.polluted that modify the base Object prototype rather than creating a nested property. This affects the integrity and availability of the application, as subsequently created objects may contain unexpected properties that alter application logic or cause crashes.

Root Cause

The root cause of CVE-2020-8203 lies in insufficient input validation within the _.zipObjectDeep function. The function processes property paths without checking whether they attempt to traverse or modify prototype properties. JavaScript's special __proto__ property accessor and the constructor property provide pathways to reach and modify Object.prototype, and the Lodash function did not block these dangerous paths.

The vulnerability is classified under CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes) and CWE-770 (Allocation of Resources Without Limits or Throttling). These weaknesses indicate both the prototype pollution vector and the potential for resource exhaustion attacks through unbounded object property creation.

Attack Vector

The attack requires network access to an application endpoint that processes user-supplied data through the vulnerable _.zipObjectDeep function. An attacker crafts malicious input containing prototype-polluting property paths and submits them to the target application. The attack complexity is considered high because successful exploitation depends on finding an application code path that passes attacker-controlled data to the vulnerable function.

A typical attack scenario involves an application that uses _.zipObjectDeep to transform API request data into internal objects. The attacker sends a request with a path like ["__proto__.isAdmin"] paired with a value of true. If the application later checks someObject.isAdmin on any object, it will inherit this polluted property and return true, potentially bypassing authorization checks.

The vulnerability enables modification of object prototypes application-wide, and can cause denial of service by corrupting critical prototype properties that crash the application when accessed. For more technical details, see the HackerOne Report #712065.

Detection Methods for CVE-2020-8203

Indicators of Compromise

  • HTTP requests containing __proto__, constructor, or prototype strings in JSON payloads or query parameters
  • Application logs showing unexpected object property access errors or type confusion exceptions
  • JavaScript runtime errors related to accessing properties on objects that should not exist
  • Unusual application behavior where default values or security checks are bypassed

Detection Strategies

  • Implement static analysis scanning of application dependencies using tools like npm audit or Snyk to identify vulnerable Lodash versions
  • Deploy web application firewall (WAF) rules to detect and block requests containing prototype pollution patterns
  • Use runtime application self-protection (RASP) solutions to monitor object prototype modifications
  • Configure SentinelOne Singularity to monitor Node.js application behavior for anomalous object property access patterns

Monitoring Recommendations

  • Enable detailed application logging for all endpoints that process user input through Lodash transformation functions
  • Monitor npm audit output in CI/CD pipelines to catch vulnerable dependency versions before deployment
  • Set up alerts for error patterns indicative of prototype pollution such as "Cannot read property of undefined" on expected objects
  • Track dependency versions across the organization and alert when outdated Lodash packages are detected

How to Mitigate CVE-2020-8203

Immediate Actions Required

  • Upgrade Lodash to version 4.17.20 or later across all affected applications
  • Run npm audit or yarn audit to identify all projects using vulnerable Lodash versions
  • Review application code to identify usages of _.zipObjectDeep and other deep property assignment functions
  • Implement input validation to reject payloads containing prototype-related property paths before processing

Patch Information

The Lodash maintainers addressed this vulnerability in version 4.17.20. The fix adds safeguards to prevent modification of object prototypes through deep property assignment functions. Organizations should update their package.json dependencies and lock files to require Lodash >=4.17.20.

Oracle addressed this vulnerability across their affected products through multiple Critical Patch Updates. For Oracle products, refer to the Oracle CPU April 2021 Alert, Oracle CPU October 2021 Alert, Oracle CPU January 2022 Alert, and Oracle CPU April 2022 Alert for specific patching guidance.

Additional vendor guidance is available through the NetApp Security Advisory and the GitHub Issue Discussion.

Workarounds

  • Implement input sanitization middleware to filter out __proto__, constructor, and prototype strings from all user input before processing
  • Use Object.freeze on Object.prototype at application startup to prevent prototype modifications (note: may break some legitimate functionality)
  • Replace vulnerable Lodash functions with safer alternatives or native JavaScript methods where possible
  • Isolate processing of untrusted input in separate JavaScript contexts or worker threads to contain potential prototype pollution
bash
# Update Lodash to patched version
npm update lodash@4.17.20

# Audit for vulnerable packages
npm audit --production

# Force resolution to safe version in package.json
npm pkg set resolutions.lodash=">=4.17.20"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechLodash

  • SeverityHIGH

  • CVSS Score7.4

  • EPSS Probability1.98%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-770

  • CWE-1321
  • Technical References
  • HackerOne Report #712065

  • NetApp Security Advisory
  • Vendor Resources
  • GitHub Issue Discussion

  • Oracle CPU July 2021 Alert

  • Oracle CPU April 2021 Alert

  • Oracle CPU April 2022 Alert

  • Oracle CPU January 2022 Alert

  • Oracle CPU October 2021 Alert
  • Related CVEs
  • CVE-2026-2950: Lodash Prototype Pollution Vulnerability

  • CVE-2025-13465: Lodash Prototype Pollution Vulnerability

  • CVE-2026-4800: Lodash Template RCE Vulnerability

  • CVE-2021-23337: Lodash Command Injection Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English