๐Ÿ” CVE Alert

CVE-2011-10026

UNKNOWN 0.0

Spreecommerce < 0.50.x API RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Rubyโ€™s send method. This flaw enables unauthenticated attackers to execute commands on the server.

CWE CWE-78
Vendor spreecommerce
Product spreecommerce
Published Aug 20, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for spreecommerce spreecommerce

Be the first to know when new unknown vulnerabilities affecting spreecommerce spreecommerce are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Spreecommerce / Spreecommerce
* < 0.50.*

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/17199 web.archive.org: https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes github.com: https://github.com/spree vulncheck.com: https://www.vulncheck.com/advisories/spreecommerce-api-rce

Credits

Joernchen (Phenoelit)