๐Ÿ” CVE Alert

CVE-2011-10019

UNKNOWN 0.0

Spreecommerce < 0.60.2 Search Parameter RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Rubyโ€™s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.

CWE CWE-94 CWE-1321
Vendor spreecommerce
Product spreecommerce
Published Aug 13, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for spreecommerce spreecommerce

Be the first to know when new unknown vulnerabilities affecting spreecommerce spreecommerce are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Spreecommerce / Spreecommerce
* < 0.60.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_search_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/17941 web.archive.org: https://web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group/ vulncheck.com: https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce github.com: https://github.com/orgs/spree

Credits

joernchen