The vulnerability occurs during Spark command construction where user-supplied configuration parameters (--conf) are directly embedded into the command string. The advisory mentions command injection via breaking out of single quotes around '--conf' values, indicating improper neutralization during command string assembly. The affected packages (kylin-spark-project) and CWE-77 pattern both point to command-building functions in Spark job execution logic. The subsequent CVE-2022-43396 and its patch (PR #2011) confirm that the initial fix in PR #1811 was insufficient, reinforcing that the core vulnerability resides in how Spark commands are constructed with user input.