Job Iteration API is vulnerable to OS Command Injection attack through its CsvEnumerator class
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Jul 14, 2025 
          in
          
            Shopify/job-iteration
          
          •
          Updated Aug 20, 2025 
      
  
Description
        Published to the GitHub Advisory Database
      Jul 14, 2025 
    
  
        Reviewed
      Jul 14, 2025 
    
  
        Published by the National Vulnerability Database
      Jul 14, 2025 
    
  
        Last updated
      Aug 20, 2025 
    
  
Impact
There is an arbitrary code execution vulnerability in the
CsvEnumeratorclass of thejob-iterationrepository. This vulnerability can be exploited by an attacker to execute arbitrary commands on the system where the application is running, potentially leading to unauthorized access, data leakage, or complete system compromise.Patches
Issue is fixed in versions
1.11.0and above.Workarounds
Users can mitigate the risk by avoiding the use of untrusted input in the
CsvEnumeratorclass and ensuring that any file paths are properly sanitized and validated before being passed to the class methods. Users should avoid callingcount_of_rows_in_fileon enumerators constructed with untrusted CSV filenames.References