๐Ÿ” CVE Alert

CVE-2026-35194

UNKNOWN 0.0

Apache Flink: Remote code execution via SQL injection in code generation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java code without proper escaping, allowing attackers to break out of string literals and inject arbitrary expressions. Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue.

CWE CWE-94
Vendor apache software foundation
Product apache flink
Published May 15, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache flink

Be the first to know when new unknown vulnerabilities affecting apache software foundation apache flink are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Apache Software Foundation / Apache Flink
1.15.0 < 1.20.4,2.0.2,2.1.2,2.2.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
lists.apache.org: https://lists.apache.org/thread/qh52bw4hhvy7n2owd8b3bt51mz0lvj9x

Credits

Yaswant Katakam, Confluent InfoSec