CVE-2026-35194
Description
Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java code without proper escaping, allowing attackers to break out of string literals and inject arbitrary expressions.
Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 6 Days)
Improper Control of Generation of Code ('Code Injection')
DraftCommon Consequences
Applicable Platforms
Flink by Apache
cpe:2.3:a:apache:flink:2.2.0:-:*:*:*:*:*:*
Flink by Apache
cpe:2.3:a:apache:flink:2.2.0:rc1:*:*:*:*:*:*
Flink by Apache
cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
Flink by Apache
cpe:2.3:a:apache:flink:2.2.0:rc2:*:*:*:*:*:*
Flink by Apache
cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
Flink by Apache
cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*