Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
Advisories
Source ID Title
EUVD EUVD EUVD-2011-5250 Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
Github GHSA Github GHSA GHSA-x485-rhg3-cqr4 Spree Commerce is vulnerable to RCE through Search API
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Nov 2025 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Wed, 24 Sep 2025 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Spreecommerce
Spreecommerce spree
Weaknesses CWE-78
CPEs cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
Vendors & Products Spreecommerce
Spreecommerce spree
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 20 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 16:00:00 +0000

Type Values Removed Values Added
Description Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
Title Spreecommerce < 0.50.x API RCE
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-25T14:19:12.623Z

Reserved: 2025-08-18T20:39:27.409Z

Link: CVE-2011-10026

cve-icon Vulnrichment

Updated: 2025-08-20T18:11:48.355Z

cve-icon NVD

Status : Modified

Published: 2025-08-20T16:15:35.440

Modified: 2025-11-25T15:15:47.310

Link: CVE-2011-10026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.