Spreecommerce versions prior to 0.50.x contain a remote...
Critical severity
Unreviewed
Published
Aug 20, 2025
to the GitHub Advisory Database
•
Updated Aug 20, 2025
Description
Published by the National Vulnerability Database
Aug 20, 2025
Published to the GitHub Advisory Database
Aug 20, 2025
Last updated
Aug 20, 2025
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
References