Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34361: CWE-552: Files or Directories Accessible to External Parties in hapifhir org.hl7.fhir.core

0
Critical
VulnerabilityCVE-2026-34361cvecve-2026-34361cwe-552
Published: Tue Mar 31 2026 (03/31/2026, 16:56:11 UTC)
Source: CVE Database V5
Vendor/Project: hapifhir
Product: org.hl7.fhir.core

Description

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated "/loadIG" endpoint that makes outbound HTTP requests to attacker-controlled URLs. Combined with a startsWith() URL prefix matching flaw in the credential provider (ManagedWebAccessUtils.getServer()), an attacker can steal authentication tokens (Bearer, Basic, API keys) configured for legitimate FHIR servers by registering a domain that prefix-matches a configured server URL. This issue has been patched in version 6.9.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 17:23:26 UTC

Technical Analysis

HAPI FHIR is a Java-based implementation of the HL7 FHIR standard widely used for healthcare interoperability. In versions prior to 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated endpoint named /loadIG. This endpoint allows external parties to trigger outbound HTTP requests to arbitrary URLs. The vulnerability arises from a flawed implementation in the credential provider component (ManagedWebAccessUtils.getServer()), which uses a startsWith() method for URL prefix matching. This logic flaw enables an attacker to register a domain name that prefix-matches a legitimate FHIR server URL configured in the system. When the vulnerable service makes requests to the attacker-controlled domain, it inadvertently sends stored authentication tokens (Bearer tokens, Basic Auth credentials, API keys) to the attacker. These tokens can then be stolen and used to access legitimate FHIR servers with elevated privileges. The vulnerability is classified under CWE-552, indicating files or directories accessible to external parties, but here it manifests as unauthorized disclosure of sensitive tokens via crafted HTTP requests. The CVSS v3.1 score is 9.3 (critical), reflecting the high impact on confidentiality, ease of exploitation without authentication or user interaction, and the broad scope of affected systems using the vulnerable library. No known exploits in the wild have been reported yet, but the severity and simplicity of exploitation make this a significant threat to healthcare data security. The issue was publicly disclosed and patched in version 6.9.4 of HAPI FHIR.

Potential Impact

The primary impact of CVE-2026-34361 is the unauthorized disclosure of sensitive authentication tokens used to access FHIR servers. This compromises the confidentiality of protected health information (PHI) and other sensitive healthcare data accessible via these servers. Attackers gaining these tokens can impersonate legitimate clients, perform unauthorized queries, modify data if tokens allow, or disrupt healthcare workflows. Although integrity impact is rated lower, stolen tokens could enable limited unauthorized modifications depending on token privileges. Availability is not directly affected by this vulnerability. Globally, healthcare organizations relying on HAPI FHIR for interoperability and data exchange are at risk of data breaches, regulatory non-compliance (e.g., HIPAA, GDPR), reputational damage, and potential financial penalties. The unauthenticated nature and lack of user interaction required for exploitation increase the likelihood of automated attacks and large-scale token theft campaigns. This threat undermines trust in healthcare data exchange platforms and could facilitate further attacks such as ransomware or fraud if attackers leverage stolen tokens for lateral movement within healthcare networks.

Mitigation Recommendations

Organizations should immediately upgrade all HAPI FHIR deployments to version 6.9.4 or later, where this vulnerability is patched. Until upgrades are completed, restrict access to the /loadIG endpoint using network-level controls such as firewalls or API gateways to prevent unauthenticated external access. Review and audit all configured FHIR server URLs to ensure no prefix-overlapping domains exist that could be exploited. Implement strict validation and allowlisting of outbound HTTP requests initiated by the FHIR Validator service. Rotate all authentication tokens (Bearer, Basic, API keys) used by FHIR clients and servers after patching to invalidate any potentially stolen credentials. Employ monitoring and alerting for unusual outbound HTTP requests and token usage patterns. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint. Educate development and security teams about secure URL matching practices to avoid similar logic flaws in future implementations. Finally, conduct penetration testing and code reviews focused on authentication token handling and external request mechanisms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T13:43:14.368Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbff80e6bfc5ba1d29f7c3

Added to database: 3/31/2026, 5:08:16 PM

Last enriched: 3/31/2026, 5:23:26 PM

Last updated: 3/31/2026, 6:11:13 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses