CVE-2011-10026
Spreecommerce < 0.50.x API RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Rubyโs send method. This flaw enables unauthenticated attackers to execute commands on the server.
| CWE | CWE-78 |
| Vendor | spreecommerce |
| Product | spreecommerce |
| Published | Aug 20, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for spreecommerce spreecommerce
Be the first to know when new unknown vulnerabilities affecting spreecommerce spreecommerce are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Spreecommerce / Spreecommerce
* < 0.50.*
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/17199 web.archive.org: https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes github.com: https://github.com/spree vulncheck.com: https://www.vulncheck.com/advisories/spreecommerce-api-rce
Credits
Joernchen (Phenoelit)