See exactly what auditors will receive. Preview both assessment tiers below.
Standard Assessment
Component
Lodash
Version
4.17.21
PURL
pkg:npm/lodash@4.17.21
Report ID
CRA-2026-STD-00012
OpenSSF Scorecard
5.2 / 10
Bus Factor
Low
Activity
Inactive
License
MIT
Single primary maintainer. No releases since April 2021. Version 4.17.21 is the final release of the 4.x line.
Active CVEs
0
Historical CVEs (24mo)
3 patched
Avg Time-to-Remediate
42 days
Historical prototype pollution vulnerabilities (CVE-2020-8203, CVE-2021-23337) are patched in this version. The _.template function remains a theoretical risk if used with untrusted input.
Critical
0
High
0
Medium
2 (FP)
Overall
PASS
2 Medium findings flagged — both false positives (eval-like patterns in build tooling, not runtime code).
Active Credentials
0
False Positives
1
Overall
PASS
Full git history (142 commits) + npm tarball scanned. 1 false positive flagged (test fixture with example API key format).
_.template() — use _.escape() first or use a dedicated templating library.Array.flat, Object.entries, String.padStart) for new code.Lodash 4.17.21 is a stable, widely-deployed utility library with no known unpatched vulnerabilities. The primary risk factor is maintenance: the project has a single maintainer and has not released an update since 2021. For general-purpose utility use (array/object manipulation, string operations), this represents acceptable risk. Teams using _.template with untrusted input should evaluate alternatives. The component is suitable for integration into products under the CRA for non-critical use cases.
"I have evaluated Lodash v4.17.21 against the essential requirements of the EU Cyber Resilience Act (CRA) Annex I. Based on the evidence gathered, I assert that this component meets the Standard due diligence requirements under CRA Article 10 / Annex I for use in non-critical environments. The component exhibits no known exploitable vulnerabilities in standard configurations, though its low maintenance activity warrants periodic re-assessment."
Signed by: Principal Security Consultant
Report ID: CRA-2026-STD-00012
Date: January 10, 2026
Machine-readable deliverables included: CycloneDX SBOM (JSON) + OpenVEX document (JSON)
This is a preview. The full report includes additional detail and regulatory cross-references.
Get both sample reports as complete PDFs — exactly what your auditors will see.
Your reports are ready!
Click below to download each sample report.
Get audit-ready reports for every component in your dependency tree.
Assess My Stack