Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 15 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache flink |
|
| Vendors & Products |
Apache
Apache flink |
|
| Metrics |
cvssV3_1
|
Fri, 15 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java code without proper escaping, allowing attackers to break out of string literals and inject arbitrary expressions. Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue. | |
| Title | Apache Flink: Remote code execution via SQL injection in code generation | |
| Weaknesses | CWE-94 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-15T21:23:25.726Z
Reserved: 2026-04-01T18:39:08.929Z
Link: CVE-2026-35194
Updated: 2026-05-15T21:23:25.726Z
Status : Received
Published: 2026-05-15T16:16:14.340
Modified: 2026-05-15T22:16:51.900
Link: CVE-2026-35194
No data.
OpenCVE Enrichment
Updated: 2026-05-15T21:00:09Z