Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
CVSS
No CVSS.
References
Configurations
No configuration.
History
22 Aug 2025, 18:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-20 16:15
Updated : 2025-08-22 18:09
NVD link : CVE-2011-10026
Mitre link : CVE-2011-10026
CVE.ORG link : CVE-2011-10026
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')