Fineract Apache Fineract

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Apache Fineract.

By the Year

In 2026 there have been 0 vulnerabilities in Apache Fineract. Last year, in 2025 Fineract had 4 security vulnerabilities published. Right now, Fineract is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 4 8.67
2024 3 9.47
2023 3 6.23
2022 1 8.80
2021 1 0.00
2020 0 0.00
2019 2 9.80
2018 4 8.70

It may take a day or so for new Fineract vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Apache Fineract Security Vulnerabilities

Apache Fineract Auth Bypass via UCK in 1.11.x (fixed 1.12.1)
CVE-2025-58137 8.1 - High - December 12, 2025

Authorization Bypass Through User-Controlled Key vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1. Users are encouraged to upgrade to version 1.13.0, the latest release.

Insecure Direct Object Reference / IDOR

Apache Fineract Insufficiently Protected Credentials (1.11.0)
CVE-2025-58130 9.1 - Critical - December 12, 2025

Insufficiently Protected Credentials vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1. Users are encouraged to upgrade to version 1.13.0, the latest release.

Insufficiently Protected Credentials

Weak PassReq in Apache Fineract v1.10.1 (fixed 1.11.0)
CVE-2025-23408 - December 12, 2025

Weak Password Requirements vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.10.1. The issue is fixed in version 1.11.0. Users are encouraged to upgrade to version 1.13.0, the latest release.

Weak Password Requirements

Apache Fineract 1.9- before 1.10.1 SQL Injection in REST API endpoints
CVE-2024-32838 8.8 - High - February 12, 2025

SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract versions 1.9 and before have a vulnerability that allows an authenticated attacker to inject malicious data into some of the REST API endpoints' query parameter.  Users are recommended to upgrade to version 1.10.1, which fixes this issue. A SQL Validator has been implemented which allows us to configure a series of tests and checks against our SQL queries that will allow us to validate and protect against nearly all potential SQL injection attacks.

SQL Injection

Apache Fineract SQL Injection (CVE-2024-23539) before v1.8.5
CVE-2024-23539 9.8 - Critical - March 29, 2024

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5. Users are recommended to upgrade to version 1.8.5 or 1.9.0, which fix the issue.

SQL Injection

Apache Fineract <1.8.5: SQLi in SQL Command (SQL Injection)
CVE-2024-23538 9.8 - Critical - March 29, 2024

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5. Users are recommended to upgrade to version 1.8.5 or 1.9.0, which fix the issue.

SQL Injection

Apache Fineract <1.8.5 Improper Privilege Management Vulnerability
CVE-2024-23537 8.8 - High - March 29, 2024

Improper Privilege Management vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5. Users are recommended to upgrade to version 1.9.0, which fixes the issue.

Improper Privilege Management

Apache Fineract 1.4-1.8.2 SQLi Vulnerability
CVE-2023-25197 6.3 - Medium - March 28, 2023

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract. Authorized users may be able to exploit this for limited impact on components. This issue affects apache fineract: from 1.4 through 1.8.2.

SQL Injection

Apache Fineract SQLi in SQL Cmd 1.4-1.8.2
CVE-2023-25196 4.3 - Medium - March 28, 2023

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache Fineract. Authorized users may be able to change or add data in certain components. This issue affects Apache Fineract: from 1.4 through 1.8.2.

SQL Injection

Apache Fineract 1.4-1.8.3 SSRF vulnerability
CVE-2023-25195 8.1 - High - March 28, 2023

Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache Fineract. Authorized users with limited permissions can gain access to server and may be able to use server for any outbound traffic.  This issue affects Apache Fineract: from 1.4 through 1.8.3.

SSRF

Apache Fineract RCE via Path Traversal in File Upload (1.8.0)
CVE-2022-44635 8.8 - High - November 29, 2022

Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.

Directory traversal

Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method
CVE-2020-17514 - May 27, 2021

Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.

SQL injection vulnerability in Apache Fineract before 1.3.0
CVE-2018-11800 9.8 - Critical - June 11, 2019

SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on the GroupSummaryCounts related table.

SQL Injection

SQL injection vulnerability in Apache Fineract before 1.3.0
CVE-2018-11801 9.8 - Critical - June 11, 2019

SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table.

SQL Injection

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters
CVE-2018-1290 9.8 - Critical - April 20, 2018

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters can cause a SQL injection. This could be done in Methods like retrieveAuditEntries of AuditsApiResource Class and retrieveCommands of MakercheckersApiResource Class.

SQL Injection

Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for
CVE-2018-1292 8.1 - High - April 20, 2018

Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for which he doesn't have authorization for by way of the 'reportName' parameter.

SQL Injection

Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy'
CVE-2018-1291 8.1 - High - April 20, 2018

Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the "order" param in such a way to read/update the data for which he doesn't have authorization.

SQL Injection

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' and 'sortOrder'
CVE-2018-1289 8.8 - High - April 20, 2018

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' and 'sortOrder' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' and 'sortOrder' query parameter in such a way to read/update the data for which he doesn't have authorization.

SQL Injection

In Apache Fineract 0.4.0-incubating
CVE-2017-5663 - December 14, 2017

In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endpoints is not sanitized and appended directly to the query.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Apache Fineract or by Apache? Click the Watch button to subscribe.

Apache
Vendor

subscribe