Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
References
| Link | Resource |
|---|---|
| https://github.com/spree | Product |
| https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb | Exploit Third Party Advisory |
| https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes | Vendor Advisory |
| https://www.exploit-db.com/exploits/17199 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/spreecommerce-api-rce | Third Party Advisory |
Configurations
History
25 Nov 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
Information
Published : 2025-08-20 16:15
Updated : 2025-11-25 15:15
NVD link : CVE-2011-10026
Mitre link : CVE-2011-10026
CVE.ORG link : CVE-2011-10026
JSON object : View
Products Affected
spreecommerce
- spree
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
