Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| spree(RubyGems) | 0.30.0.beta1 | 0.50.0 | N/A |
| rd_searchlogic(RubyGems) | 0 | N/A | N/A |
CVSS Metrics