Apache Fineract vulnerabilities
20 known vulnerabilities affecting apache/fineract.
Total CVEs
20
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL7HIGH11MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2025-58130CRITICALCVSS 9.1fixed in 1.12.12025-12-12
CVE-2025-58130 [CRITICAL] CWE-522 CVE-2025-58130: Insufficiently Protected Credentials vulnerability in Apache Fineract.
This issue affects Apache Fi
Insufficiently Protected Credentials vulnerability in Apache Fineract.
This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1.
Users are encouraged to upgrade to version 1.13.0, the latest release.
nvd
CVE-2025-23408HIGHCVSS 8.5fixed in 1.11.02025-12-12
CVE-2025-23408 [HIGH] CWE-521 CVE-2025-23408: Weak Password Requirements vulnerability in Apache Fineract.
This issue affects Apache Fineract: th
Weak Password Requirements vulnerability in Apache Fineract.
This issue affects Apache Fineract: through 1.10.1. The issue is fixed in version 1.11.0.
Users are encouraged to upgrade to version 1.13.0, the latest release.
nvd
CVE-2025-58137HIGHCVSS 8.1fixed in 1.12.12025-12-12
CVE-2025-58137 [HIGH] CWE-639 CVE-2025-58137: Authorization Bypass Through User-Controlled Key vulnerability in Apache Fineract.
This issue affec
Authorization Bypass Through User-Controlled Key vulnerability in Apache Fineract.
This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1.
Users are encouraged to upgrade to version 1.13.0, the latest release.
nvd
CVE-2024-32838CRITICALCVSS 9.4≥ 1.4.0, < 1.10.12025-02-12
CVE-2024-32838 [CRITICAL] CWE-89 CVE-2024-32838: SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract ver
SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract versions 1.9 and before have a vulnerability that allows an authenticated attacker to inject malicious data into some of the REST API endpoints' query parameter.
Users are recommended to upgrade to version 1.10.1, which fixes this issue.
A SQL Validato
nvd
CVE-2024-23539CRITICALCVSS 9.8fixed in 1.9.02024-03-29
CVE-2024-23539 [HIGH] CWE-89 CVE-2024-23539: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability i
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5.
Users are recommended to upgrade to version 1.8.5 or 1.9.0, which fix the issue.
nvd
CVE-2024-23538CRITICALCVSS 9.8fixed in 1.9.02024-03-29
CVE-2024-23538 [CRITICAL] CWE-89 CVE-2024-23538: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability i
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5.
Users are recommended to upgrade to version 1.8.5 or 1.9.0, which fix the issue.
nvd
CVE-2024-23537HIGHCVSS 8.8fixed in 1.9.02024-03-29
CVE-2024-23537 [HIGH] CWE-269 CVE-2024-23537: Improper Privilege Management vulnerability in Apache Fineract.This issue affects Apache Fineract: <
Improper Privilege Management vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5.
Users are recommended to upgrade to version 1.9.0, which fixes the issue.
nvd
CVE-2023-25195HIGHCVSS 8.1≥ 1.4.0, ≤ 1.8.32023-03-28
CVE-2023-25195 [HIGH] CWE-918 CVE-2023-25195: Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache Fineract.
Auth
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache Fineract.
Authorized users with limited permissions can gain access to server and may be able to use server for any outbound traffic.
This issue affects Apache Fineract: from 1.4 through 1.8.3.
nvd
CVE-2023-25197MEDIUMCVSS 6.3≥ 1.4.0, ≤ 1.8.22023-03-28
CVE-2023-25197 [MEDIUM] CWE-89 CVE-2023-25197: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability i
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract.
Authorized users may be able to exploit this for limited impact on components.
This issue affects apache fineract: from 1.4 through 1.8.2.
nvd
CVE-2023-25196MEDIUMCVSS 4.3≥ 1.4.0, ≤ 1.8.22023-03-28
CVE-2023-25196 [MEDIUM] CWE-89 CVE-2023-25196: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability i
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache Fineract.
Authorized users may be able to change or add data in certain components.
This issue affects Apache Fineract: from 1.4 through 1.8.2.
nvd
CVE-2022-44635HIGHCVSS 8.8fixed in 1.8.12022-11-29
CVE-2022-44635 [HIGH] CWE-22 CVE-2022-44635: Apache Fineract allowed an authenticated user to perform remote code execution due to a path travers
Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
nvd
CVE-2020-17514HIGHCVSS 7.4fixed in 1.5.02021-05-27
CVE-2020-17514 [HIGH] CVE-2020-17514: Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the config
Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.
nvd
CVE-2018-20243HIGHCVSS 7.5≥ 1.0.0, ≤ 1.3.0v0.4.0+2 more2020-10-13
CVE-2018-20243 [HIGH] CWE-522 CVE-2018-20243: The implementation of POST with the username and password in the URL parameters exposed the credenti
The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.
nvd
CVE-2018-11801CRITICALCVSS 9.8fixed in 1.3.02019-06-11
CVE-2018-11801 [CRITICAL] CWE-89 CVE-2018-11801: SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQ
SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table.
nvd
CVE-2018-11800CRITICALCVSS 9.8fixed in 1.3.02019-06-11
CVE-2018-11800 [CRITICAL] CWE-89 CVE-2018-11800: SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQ
SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on the GroupSummaryCounts related table.
nvd
CVE-2018-1290CRITICALCVSS 9.8v0.4.0v0.5.0+2 more2018-04-20
CVE-2018-1290 [CRITICAL] CWE-89 CVE-2018-1290: In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a sin
In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters can cause a SQL injection. This could be done in Methods like retrieveAuditEntries of AuditsApiResource Class and retrieveCommands of MakercheckersApiResource Class.
nvd
CVE-2018-1289HIGHCVSS 8.8v0.4.0v0.5.0+2 more2018-04-20
CVE-2018-1289 [HIGH] CWE-89 CVE-2018-1289: In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system
In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' and 'sortOrder' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' and 'sortOrder' query parameter in such a way
nvd
CVE-2018-1291HIGHCVSS 8.1v0.4.0v0.5.0+2 more2018-04-20
CVE-2018-1291 [HIGH] CWE-89 CVE-2018-1291: Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST e
Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the "order" param in such a way to read/update the data for
nvd
CVE-2018-1292HIGHCVSS 8.1v0.4.0v0.5.0+2 more2018-04-20
CVE-2018-1292 [HIGH] CWE-89 CVE-2018-1292: Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.
Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for which he doesn't have authorization for by way of the 'reportName' parameter.
nvd
CVE-2017-5663HIGHCVSS 8.8v0.4.0-incubatingv0.5.0-incubating+1 more2017-12-14
CVE-2017-5663 [HIGH] CWE-89 CVE-2017-5663: In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user w
In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endpoints is not sanitized and appended directly to the query.
nvd