CVE-2011-10026

CRITICAL

Spree < 0.50.1 - OS Command Injection

Title source: rule

Description

Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/17199
metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spree_searchlogic_exec.rb

Scores

CVSS v3 9.8
EPSS 0.6536
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (4)
rubygems/rd_searchlogic 0RubyGems
rubygems/spree 0.30.0.beta1 - 0.50.0RubyGems
spreecommerce/spree < 0.50.1
Spreecommerce/Spreecommerce < 0.50.*
Published Aug 20, 2025
Tracked Since Feb 18, 2026