Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
40 changes: 40 additions & 0 deletions gems/job-iteration/CVE-2025-53623.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
---
gem: job-iteration
cve: 2025-53623
ghsa: 6qjf-g333-pv38
url: https://github.com/Shopify/job-iteration/security/advisories/GHSA-6qjf-g333-pv38
title: Job Iteration API is vulnerable to OS Command Injection attack
through its CsvEnumerator class
date: 2025-07-14
description: |
### Impact

There is an arbitrary code execution vulnerability in the
`CsvEnumerator` class of the `job-iteration` repository. This
vulnerability can be exploited by an attacker to execute arbitrary
commands on the system where the application is running, potentially
leading to unauthorized access, data leakage, or complete system
compromise.

### Patches

Issue is fixed in versions `1.11.0` and above.

### Workarounds

Users can mitigate the risk by avoiding the use of untrusted input
in the `CsvEnumerator` class and ensuring that any file paths are
properly sanitized and validated before being passed to the class
methods. Users should avoid calling `size` on enumerators
constructed with untrusted CSV filenames.
cvss_v4: 8.1
patched_versions:
- ">= 1.11"
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2025-53623
- https://github.com/Shopify/job-iteration/security/advisories/GHSA-6qjf-g333-pv38
- https://github.com/Shopify/job-iteration/pull/595
- https://github.com/Shopify/job-iteration/commit/1a7adfdd041105a5e45e774cadc6b973a292ba55
- https://github.com/Shopify/job-iteration/releases/tag/v1.11.0
- https://github.com/advisories/GHSA-6qjf-g333-pv38