VYPR
Critical severityNVD Advisory· Published Aug 13, 2025· Updated Apr 7, 2026

Spreecommerce < 0.60.2 Search Parameter RCE

CVE-2011-10019

Description

Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Spreecommerce before 0.60.2 has unauthenticated remote command execution via search[send][] parameter due to unsanitized input to Ruby's send method.

Vulnerability

Spreecommerce versions prior to 0.60.2 contain a remote command execution vulnerability in the search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby's send method [1][2]. This allows arbitrary method calls on the underlying objects.

Exploitation

An attacker can exploit this by sending a crafted HTTP request to the search endpoint without authentication. The Metasploit module demonstrates a payload that uses Kernel.fork to execute shell commands [4]. The exploit requires no authentication and is accessible from the network.

Impact

Successful exploitation grants an unauthenticated attacker the ability to execute arbitrary shell commands on the server, leading to full system compromise [2][4]. The vulnerability can be used to gain remote code execution, data exfiltration, or further lateral movement.

Mitigation

The vulnerability was patched in Spreecommerce version 0.60.2 [1][2]. Users running earlier versions should upgrade immediately. A Metasploit exploit module is publicly available, increasing the risk of active exploitation [4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
spreeRubyGems
< 0.60.20.60.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.