Spree Commerce is vulnerable to RCE through Search API
Critical severity
GitHub Reviewed
Published
Aug 20, 2025
to the GitHub Advisory Database
•
Updated Dec 1, 2025
Description
Published by the National Vulnerability Database
Aug 20, 2025
Published to the GitHub Advisory Database
Aug 20, 2025
Reviewed
Nov 26, 2025
Last updated
Dec 1, 2025
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
References