Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-35194
Analyzed
More InfoOfficial Page
Source-security@apache.org
View Known Exploited Vulnerability (KEV) details
Published At-15 May, 2026 | 16:16
Updated At-18 May, 2026 | 19:48

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java code without proper escaping, allowing attackers to break out of string literals and inject arbitrary expressions. Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CPE Matches

The Apache Software Foundation
apache
>>flink>>Versions from 1.15.0(inclusive) to 1.20.4(exclusive)
cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>flink>>Versions from 2.0.0(inclusive) to 2.0.2(exclusive)
cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>flink>>Versions from 2.1.0(inclusive) to 2.1.2(exclusive)
cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>flink>>2.2.0
cpe:2.3:a:apache:flink:2.2.0:-:*:*:*:*:*:*
The Apache Software Foundation
apache
>>flink>>2.2.0
cpe:2.3:a:apache:flink:2.2.0:rc1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>flink>>2.2.0
cpe:2.3:a:apache:flink:2.2.0:rc2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Secondarysecurity@apache.org
CWE ID: CWE-94
Type: Secondary
Source: security@apache.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://lists.apache.org/thread/qh52bw4hhvy7n2owd8b3bt51mz0lvj9xsecurity@apache.org
Mailing List
Vendor Advisory
http://www.openwall.com/lists/oss-security/2026/05/15/20af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
Hyperlink: https://lists.apache.org/thread/qh52bw4hhvy7n2owd8b3bt51mz0lvj9x
Source: security@apache.org
Resource:
Mailing List
Vendor Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2026/05/15/20
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Change History
0Changes found

Details not found