CVE-2026-25757
- EPSS 0.02%
- Veröffentlicht 06.02.2026 22:37:07
- Zuletzt bearbeitet 23.02.2026 17:40:58
Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 5.0.8, 5.1.10, 5.2.7, and 5.3.2, unauthenticated users can view completed guest orders by Order ID. This issue may lead to disclosure of PII of guest users (inclu...
CVE-2026-25758
- EPSS 0.02%
- Veröffentlicht 06.02.2026 21:29:20
- Zuletzt bearbeitet 19.02.2026 18:01:26
Spree is an open source e-commerce solution built with Ruby on Rails. A critical IDOR vulnerability exists in Spree Commerce's guest checkout flow that allows any guest user to bind arbitrary guest addresses to their order by manipulating address ID ...
CVE-2026-22589
- EPSS 0.07%
- Veröffentlicht 10.01.2026 03:17:58
- Zuletzt bearbeitet 22.01.2026 13:45:29
Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Unauthenticated Insecure Direct Object Reference (IDOR) vulnerability was identified that allows an unauthenticated attacker t...
CVE-2026-22588
- EPSS 0.01%
- Veröffentlicht 08.01.2026 20:53:37
- Zuletzt bearbeitet 02.02.2026 16:14:33
Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Authenticated Insecure Direct Object Reference (IDOR) vulnerability was identified that allows an authenticated user to retrie...
CVE-2011-10026
- EPSS 65.36%
- Veröffentlicht 20.08.2025 15:41:40
- Zuletzt bearbeitet 25.11.2025 15:15:47
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is...
CVE-2011-10019
- EPSS 69.31%
- Veröffentlicht 13.08.2025 20:53:33
- Zuletzt bearbeitet 24.09.2025 00:31:10
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s ...
CVE-2020-26223
- EPSS 0.27%
- Veröffentlicht 13.11.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:19:34
Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status...
CVE-2013-1656
- EPSS 0.31%
- Veröffentlicht 08.03.2013 18:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb;...
- EPSS 0.17%
- Veröffentlicht 08.03.2013 18:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
app/models/spree/user.rb in spree_auth_devise in Spree 1.1.x before 1.1.6, 1.2.x, and 1.3.x does not perform mass assignment safely when updating a user, which allows remote authenticated users to assign arbitrary roles to themselves.
- EPSS 0.16%
- Veröffentlicht 05.04.2012 13:25:21
- Zuletzt bearbeitet 11.04.2025 00:51:21
Spree 0.2.0 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the Order state value and bypass the intended payment step via a modified URL, related to a "mass assignment" vu...