Home

Description

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java code without proper escaping, allowing attackers to break out of string literals and inject arbitrary expressions. Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue.

PUBLISHED Reserved 2026-04-01 | Published 2026-05-15 | Updated 2026-05-15 | Assigner apache

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

1.15.0 (semver) before 1.20.4,2.0.2,2.1.2,2.2.1
affected

Credits

Yaswant Katakam, Confluent InfoSec finder

References

www.openwall.com/lists/oss-security/2026/05/15/20

lists.apache.org/thread/qh52bw4hhvy7n2owd8b3bt51mz0lvj9x vendor-advisory

cve.org (CVE-2026-35194)

nvd.nist.gov (CVE-2026-35194)

Download JSON