Spreecommerce versions prior to 0.60.2 contains a remote...
Critical severity
Unreviewed
Published
Aug 13, 2025
to the GitHub Advisory Database
•
Updated Aug 18, 2025
Description
Published by the National Vulnerability Database
Aug 13, 2025
Published to the GitHub Advisory Database
Aug 13, 2025
Last updated
Aug 18, 2025
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
References