CVE-2026-34359: CWE-346: Origin Validation Error in hapifhir org.hl7.fhir.core
CVE-2026-34359 is a high-severity origin validation vulnerability in the HAPI FHIR Java library versions prior to 6. 9. 4. The flaw arises from improper URL prefix matching in ManagedWebAccessUtils. getServer(), which uses String. startsWith() without enforcing host boundary checks or trailing slashes. This allows attacker-controlled domains with similar prefixes (e. g. , http://tx. fhir.
AI Analysis
Technical Summary
CVE-2026-34359 is a vulnerability classified under CWE-346 (Origin Validation Error) affecting the HAPI FHIR Java library, specifically versions prior to 6.9.4. HAPI FHIR is widely used to implement the HL7 FHIR standard for healthcare data interoperability. The vulnerability stems from the method ManagedWebAccessUtils.getServer() using a naive string prefix check (String.startsWith()) to validate request URLs against configured server URLs for dispatching authentication credentials. Because the configured URLs lack a trailing slash or explicit host boundary verification, an attacker can craft malicious domains that begin with the trusted server URL prefix but are actually attacker-controlled (e.g., http://tx.fhir.org.attacker.com). When an HTTP client follows a redirect to such a domain, the system mistakenly sends sensitive authentication credentials—including Bearer tokens, Basic authentication credentials, or API keys—to the attacker’s domain. This results in credential leakage and potential unauthorized access to protected healthcare data or services. The vulnerability is remotely exploitable without authentication or user interaction, affecting confidentiality and integrity but not availability. The flaw was publicly disclosed on March 31, 2026, with a CVSS v3.1 score of 7.4 (high severity). The issue has been fixed in HAPI FHIR version 6.9.4 by correcting the URL validation logic to properly enforce host boundaries and trailing slashes, preventing prefix-based spoofing attacks.
Potential Impact
The primary impact of CVE-2026-34359 is the leakage of sensitive authentication credentials to attacker-controlled domains, which can lead to unauthorized access to healthcare interoperability systems using HAPI FHIR. This compromises the confidentiality and integrity of protected health information (PHI) and related data exchanges. Attackers can intercept Bearer tokens, Basic auth credentials, or API keys, enabling them to impersonate legitimate clients or services, potentially leading to data breaches, unauthorized data modification, or disruption of healthcare workflows. Given the critical nature of healthcare data and regulatory requirements such as HIPAA, exploitation could result in severe legal, financial, and reputational damage to affected organizations. The vulnerability affects any organization using vulnerable versions of HAPI FHIR, including healthcare providers, health IT vendors, and third-party integrators worldwide. Although no known exploits are currently reported in the wild, the ease of remote exploitation without authentication or user interaction makes this a significant risk that demands prompt remediation.
Mitigation Recommendations
To mitigate CVE-2026-34359, organizations should immediately upgrade all instances of HAPI FHIR to version 6.9.4 or later, where the vulnerability has been patched. If upgrading is not immediately feasible, implement strict network-level controls to restrict outbound HTTP redirects and monitor for suspicious redirect patterns that could lead to attacker-controlled domains. Review and harden URL validation logic in any custom integrations or wrappers around HAPI FHIR to ensure host boundaries are properly enforced, avoiding naive prefix matching. Employ robust logging and alerting on authentication credential dispatch events to detect anomalous behavior. Additionally, consider implementing token binding or short-lived tokens to reduce the impact of credential leakage. Conduct thorough security testing and code reviews focusing on origin validation and authentication dispatch mechanisms. Finally, educate developers and administrators about the risks of improper URL validation and the importance of applying vendor patches promptly.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Sweden, Norway
CVE-2026-34359: CWE-346: Origin Validation Error in hapifhir org.hl7.fhir.core
Description
CVE-2026-34359 is a high-severity origin validation vulnerability in the HAPI FHIR Java library versions prior to 6. 9. 4. The flaw arises from improper URL prefix matching in ManagedWebAccessUtils. getServer(), which uses String. startsWith() without enforcing host boundary checks or trailing slashes. This allows attacker-controlled domains with similar prefixes (e. g. , http://tx. fhir.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34359 is a vulnerability classified under CWE-346 (Origin Validation Error) affecting the HAPI FHIR Java library, specifically versions prior to 6.9.4. HAPI FHIR is widely used to implement the HL7 FHIR standard for healthcare data interoperability. The vulnerability stems from the method ManagedWebAccessUtils.getServer() using a naive string prefix check (String.startsWith()) to validate request URLs against configured server URLs for dispatching authentication credentials. Because the configured URLs lack a trailing slash or explicit host boundary verification, an attacker can craft malicious domains that begin with the trusted server URL prefix but are actually attacker-controlled (e.g., http://tx.fhir.org.attacker.com). When an HTTP client follows a redirect to such a domain, the system mistakenly sends sensitive authentication credentials—including Bearer tokens, Basic authentication credentials, or API keys—to the attacker’s domain. This results in credential leakage and potential unauthorized access to protected healthcare data or services. The vulnerability is remotely exploitable without authentication or user interaction, affecting confidentiality and integrity but not availability. The flaw was publicly disclosed on March 31, 2026, with a CVSS v3.1 score of 7.4 (high severity). The issue has been fixed in HAPI FHIR version 6.9.4 by correcting the URL validation logic to properly enforce host boundaries and trailing slashes, preventing prefix-based spoofing attacks.
Potential Impact
The primary impact of CVE-2026-34359 is the leakage of sensitive authentication credentials to attacker-controlled domains, which can lead to unauthorized access to healthcare interoperability systems using HAPI FHIR. This compromises the confidentiality and integrity of protected health information (PHI) and related data exchanges. Attackers can intercept Bearer tokens, Basic auth credentials, or API keys, enabling them to impersonate legitimate clients or services, potentially leading to data breaches, unauthorized data modification, or disruption of healthcare workflows. Given the critical nature of healthcare data and regulatory requirements such as HIPAA, exploitation could result in severe legal, financial, and reputational damage to affected organizations. The vulnerability affects any organization using vulnerable versions of HAPI FHIR, including healthcare providers, health IT vendors, and third-party integrators worldwide. Although no known exploits are currently reported in the wild, the ease of remote exploitation without authentication or user interaction makes this a significant risk that demands prompt remediation.
Mitigation Recommendations
To mitigate CVE-2026-34359, organizations should immediately upgrade all instances of HAPI FHIR to version 6.9.4 or later, where the vulnerability has been patched. If upgrading is not immediately feasible, implement strict network-level controls to restrict outbound HTTP redirects and monitor for suspicious redirect patterns that could lead to attacker-controlled domains. Review and harden URL validation logic in any custom integrations or wrappers around HAPI FHIR to ensure host boundaries are properly enforced, avoiding naive prefix matching. Employ robust logging and alerting on authentication credential dispatch events to detect anomalous behavior. Additionally, consider implementing token binding or short-lived tokens to reduce the impact of credential leakage. Conduct thorough security testing and code reviews focusing on origin validation and authentication dispatch mechanisms. Finally, educate developers and administrators about the risks of improper URL validation and the importance of applying vendor patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-27T13:43:14.368Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cbff80e6bfc5ba1d29f7bd
Added to database: 3/31/2026, 5:08:16 PM
Last enriched: 3/31/2026, 5:23:38 PM
Last updated: 3/31/2026, 6:57:09 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.