CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
20 results Clear all
CVE-2025-58137 8.1 HIGH EPSS 0.00
Apache Fineract < 1.12.1 - IDOR
Authorization Bypass Through User-Controlled Key vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1. Users are encouraged to upgrade to version 1.13.0, the latest release.
CWE-639 Dec 12, 2025
CVE-2025-58130 9.1 CRITICAL EPSS 0.00
Apache Fineract < 1.12.1 - Insufficiently Protected Credentials
Insufficiently Protected Credentials vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1. Users are encouraged to upgrade to version 1.13.0, the latest release.
CWE-522 Dec 12, 2025
CVE-2025-23408 6.5 MEDIUM EPSS 0.00
Apache Fineract <1.10.1 - Info Disclosure
Weak Password Requirements vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.10.1. The issue is fixed in version 1.11.0. Users are encouraged to upgrade to version 1.13.0, the latest release.
CWE-521 Dec 12, 2025
CVE-2024-32838 8.8 HIGH EPSS 0.00
Apache Fineract < 1.10.1 - SQL Injection
SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract versions 1.9 and before have a vulnerability that allows an authenticated attacker to inject malicious data into some of the REST API endpoints' query parameter.  Users are recommended to upgrade to version 1.10.1, which fixes this issue. A SQL Validator has been implemented which allows us to configure a series of tests and checks against our SQL queries that will allow us to validate and protect against nearly all potential SQL injection attacks.
CWE-89 Feb 12, 2025
CVE-2024-23539 8.3 HIGH EPSS 0.01
Apache Fineract < 1.9.0 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5. Users are recommended to upgrade to version 1.8.5 or 1.9.0, which fix the issue.
CWE-89 Mar 29, 2024
CVE-2024-23538 9.9 CRITICAL EPSS 0.00
Apache Fineract < 1.9.0 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5. Users are recommended to upgrade to version 1.8.5 or 1.9.0, which fix the issue.
CWE-89 Mar 29, 2024
CVE-2024-23537 8.4 HIGH EPSS 0.00
Apache Fineract < 1.9.0 - Improper Privilege Management
Improper Privilege Management vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5. Users are recommended to upgrade to version 1.9.0, which fixes the issue.
CWE-269 Mar 29, 2024
CVE-2023-25197 6.3 MEDIUM EPSS 0.00
Apache Fineract < 1.8.2 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract. Authorized users may be able to exploit this for limited impact on components.   This issue affects apache fineract: from 1.4 through 1.8.2.
CWE-89 Mar 28, 2023
CVE-2023-25196 4.3 MEDIUM EPSS 0.00
Apache Fineract < 1.8.2 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache Fineract. Authorized users may be able to change or add data in certain components.   This issue affects Apache Fineract: from 1.4 through 1.8.2.
CWE-89 Mar 28, 2023
CVE-2023-25195 8.1 HIGH EPSS 0.00
Apache Fineract < 1.8.3 - SSRF
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache Fineract. Authorized users with limited permissions can gain access to server and may be able to use server for any outbound traffic.  This issue affects Apache Fineract: from 1.4 through 1.8.3.
CWE-918 Mar 28, 2023
CVE-2022-44635 8.8 HIGH EPSS 0.13
Apache Fineract < 1.8.1 - Path Traversal
Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
CWE-22 Nov 29, 2022
CVE-2020-17514 7.4 HIGH EPSS 0.01
Apache Fineract <1.5.0 - Info Disclosure
Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.
May 27, 2021
CVE-2018-20243 7.5 HIGH EPSS 0.01
Fineract - Info Disclosure
The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.
CWE-522 Oct 13, 2020
CVE-2018-11801 9.8 CRITICAL EPSS 0.03
Apache Fineract <1.3.0 - SQL Injection
SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table.
CWE-89 Jun 11, 2019
CVE-2018-11800 9.8 CRITICAL EPSS 0.03
Apache Fineract <1.3.0 - SQL Injection
SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on the GroupSummaryCounts related table.
CWE-89 Jun 11, 2019
CVE-2018-1292 8.1 HIGH EPSS 0.01
Apache Fineract - SQL Injection
Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for which he doesn't have authorization for by way of the 'reportName' parameter.
CWE-89 Apr 20, 2018
CVE-2018-1291 8.1 HIGH EPSS 0.00
Apache Fineract - SQL Injection
Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the "order" param in such a way to read/update the data for which he doesn't have authorization.
CWE-89 Apr 20, 2018
CVE-2018-1290 9.8 CRITICAL EPSS 0.01
Apache Fineract - SQL Injection
In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters can cause a SQL injection. This could be done in Methods like retrieveAuditEntries of AuditsApiResource Class and retrieveCommands of MakercheckersApiResource Class.
CWE-89 Apr 20, 2018
CVE-2018-1289 8.8 HIGH EPSS 0.01
Apache Fineract - SQL Injection
In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' and 'sortOrder' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' and 'sortOrder' query parameter in such a way to read/update the data for which he doesn't have authorization.
CWE-89 Apr 20, 2018
CVE-2017-5663 8.8 HIGH EPSS 0.00
Apache Fineract - SQL Injection
In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endpoints is not sanitized and appended directly to the query.
CWE-89 Dec 14, 2017