CVE-2011-10019
Spreecommerce < 0.60.2 Search Parameter RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Rubyโs send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
| CWE | CWE-94 CWE-1321 |
| Vendor | spreecommerce |
| Product | spreecommerce |
| Published | Aug 13, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for spreecommerce spreecommerce
Be the first to know when new unknown vulnerabilities affecting spreecommerce spreecommerce are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Spreecommerce / Spreecommerce
* < 0.60.2
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_search_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/17941 web.archive.org: https://web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group/ vulncheck.com: https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce github.com: https://github.com/orgs/spree
Credits
joernchen