Spree has Remote Command Execution vulnerability in search functionality
Critical severity
GitHub Reviewed
Published
Aug 13, 2025
to the GitHub Advisory Database
•
Updated Jan 13, 2026
Description
Published by the National Vulnerability Database
Aug 13, 2025
Published to the GitHub Advisory Database
Aug 13, 2025
Reviewed
Jan 13, 2026
Last updated
Jan 13, 2026
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
References