<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4800 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4800/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 31 Mar 2026 20:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4800/feed.xml" rel="self" type="application/rss+xml"/><item><title>lodash _.template Function Injection Vulnerability (CVE-2026-4800)</title><link>https://feed.craftedsignal.io/briefs/2026-03-lodash-template-injection/</link><pubDate>Tue, 31 Mar 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-lodash-template-injection/</guid><description>CVE-2026-4800 allows attackers to inject arbitrary code at template compilation time via untrusted input passed as key names in the options.imports object of the _.template function in lodash versions prior to 4.18.0, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-4800 exposes a critical vulnerability within the <code>_.template</code> function of the lodash library in versions prior to 4.18.0. This vulnerability arises from insufficient validation when processing user-supplied input within the <code>options.imports</code> object. Specifically, while a fix for CVE-2021-23337 addressed validation for the <code>variable</code> option, it failed to extend the same rigorous checks to the key names within <code>options.imports</code>. Attackers can exploit this oversight by injecting malicious default-parameter expressions as key names in <code>options.imports</code>, triggering arbitrary code execution during the template compilation phase. This poses a significant risk, especially in applications that accept untrusted input to configure lodash templates, potentially leading to full system compromise. Furthermore, the vulnerability can be exacerbated if the <code>Object.prototype</code> is polluted, allowing inherited properties to be injected into the <code>imports</code> object, increasing the attack surface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The application receives untrusted input intended for use in a lodash template.</li>
<li>The attacker crafts a malicious payload containing JavaScript code within the key names of the <code>options.imports</code> object. This payload leverages the default parameter expression vulnerability.</li>
<li>The application passes the attacker-controlled <code>options.imports</code> object to the <code>_.template</code> function.</li>
<li>The <code>_.template</code> function processes the <code>options.imports</code> without proper validation of the key names.</li>
<li>The <code>assignInWith</code> function merges the provided imports, including the attacker-controlled key names and their malicious content, into the template context.</li>
<li>During template compilation, the JavaScript <code>Function()</code> constructor is invoked, embedding the attacker&rsquo;s injected code.</li>
<li>The injected code executes within the context of the application, granting the attacker arbitrary code execution.</li>
<li>The attacker can leverage this code execution to perform actions such as installing malware, exfiltrating sensitive data, or compromising other parts of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4800 can lead to arbitrary code execution on the server or client machine where the vulnerable application is running. The severity of this vulnerability is high, as it allows attackers to potentially gain full control of the affected system. The number of potential victims is broad, including any application using a vulnerable version of lodash and processing untrusted input in template configurations. This could affect various sectors, including web applications, APIs, and server-side rendering frameworks. A successful attack could result in data breaches, service disruptions, and complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to lodash version 4.18.0 or later to patch CVE-2026-4800, which implements proper validation for <code>options.imports</code>.</li>
<li>Implement strict input validation on any data used to construct <code>options.imports</code> objects to prevent injection attacks.</li>
<li>Apply the workaround by only using developer-controlled, static key names in <code>options.imports</code> to avoid passing untrusted input as key names.</li>
<li>Deploy the Sigma rule <code>Detect Lodash Template Injection via options.imports</code> to identify potential exploitation attempts in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>lodash</category><category>template-injection</category><category>rce</category><category>cve-2026-4800</category></item></channel></rss>