VYPR
High severity8.1NVD Advisory· Published May 15, 2026· Updated May 15, 2026

CVE-2026-35194

CVE-2026-35194

Description

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java code without proper escaping, allowing attackers to break out of string literals and inject arbitrary expressions.

Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue.

Affected products

2
  • Apache/Flinkinferred2 versions
    >=1.15.0+ 1 more
    • (no CPE)range: >=1.15.0
    • (no CPE)range: >=1.15.0,<1.20.4 || >=2.0.0,<2.2.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.