You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: advisories/github-reviewed/2025/08/GHSA-x485-rhg3-cqr4/GHSA-x485-rhg3-cqr4.json
+56-8Lines changed: 56 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -1,32 +1,80 @@
1
1
{
2
2
"schema_version": "1.4.0",
3
3
"id": "GHSA-x485-rhg3-cqr4",
4
-
"modified": "2025-11-25T15:31:33Z",
4
+
"modified": "2025-11-26T00:04:31Z",
5
5
"published": "2025-08-20T18:30:21Z",
6
6
"aliases": [
7
7
"CVE-2011-10026"
8
8
],
9
+
"summary": "Spree Commerce is vulnerable to RCE through Search API",
9
10
"details": "Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.",
0 commit comments