Bug 2432951

Summary: CVE-2025-13465 389-ds-base: prototype pollution in _.unset and _.omit functions [fedora-42]
Product: [Fedora] Fedora Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: 389-ds-baseAssignee: mreynolds
Status: CLOSED NOTABUG QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: high Docs Contact:
Priority: high    
Version: 42CC: abokovoy, jachapma, mreynolds, spichugi, tbordaz, vashirov
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---Flags: fedora-admin-xmlrpc: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["2207a801-158d-4213-ada5-49f943885c4d"]}
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2026-02-20 17:45:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2431740    

Description Guilherme de Almeida Suckevicz 2026-01-26 18:42:28 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Viktor Ashirov 2026-02-20 17:45:19 UTC
_.unset and _.omit are never called anywhere: not in the cockpit-389-ds source code, not in @patternfly, and not in victory-* packages.
Even if the vulnerable functions were called, exploitation requires an attacker to control the path argument.
cockpit-389-ds is an application for Cockpit admin console, it runs locally, not as a public-facing web service. And no lodash path-based functions receive user-controlled input.