The project import functionality in SoapUI 5.3.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL project file. Additional References: http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html
JBoss SOA-P 5.3.1 includes SoapUI 1.7.1. This vulnerability was introduced in version 3 with the additional of Groovy scripting, see https://www.soapui.org/scripting-properties/scripting-and-the-script-library.html. Version 1.7.1 of SoapUI in SOA-P 5.3.1 doesn't contain the SoapUIGroovyScriptEngine class mentioned in the stack trace of the packetstormsecurity.com report.