CVE-2011-10026
CRITICALSpree < 0.50.1 - OS Command Injection
Title source: ruleDescription
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/17199
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
References (5)
Scores
CVSS v3
9.8
EPSS
0.6536
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (4)
rubygems/rd_searchlogic
0RubyGems
rubygems/spree
0.30.0.beta1 - 0.50.0RubyGems
spreecommerce/spree
< 0.50.1
Spreecommerce/Spreecommerce
< 0.50.*
Published
Aug 20, 2025
Tracked Since
Feb 18, 2026