CVE-2026-34361: CWE-552: Files or Directories Accessible to External Parties in hapifhir org.hl7.fhir.core
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated "/loadIG" endpoint that makes outbound HTTP requests to attacker-controlled URLs. Combined with a startsWith() URL prefix matching flaw in the credential provider (ManagedWebAccessUtils.getServer()), an attacker can steal authentication tokens (Bearer, Basic, API keys) configured for legitimate FHIR servers by registering a domain that prefix-matches a configured server URL. This issue has been patched in version 6.9.4.
AI Analysis
Technical Summary
HAPI FHIR is a Java-based implementation of the HL7 FHIR standard widely used for healthcare interoperability. In versions prior to 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated endpoint named /loadIG. This endpoint allows external parties to trigger outbound HTTP requests to arbitrary URLs. The vulnerability arises from a flawed implementation in the credential provider component (ManagedWebAccessUtils.getServer()), which uses a startsWith() method for URL prefix matching. This logic flaw enables an attacker to register a domain name that prefix-matches a legitimate FHIR server URL configured in the system. When the vulnerable service makes requests to the attacker-controlled domain, it inadvertently sends stored authentication tokens (Bearer tokens, Basic Auth credentials, API keys) to the attacker. These tokens can then be stolen and used to access legitimate FHIR servers with elevated privileges. The vulnerability is classified under CWE-552, indicating files or directories accessible to external parties, but here it manifests as unauthorized disclosure of sensitive tokens via crafted HTTP requests. The CVSS v3.1 score is 9.3 (critical), reflecting the high impact on confidentiality, ease of exploitation without authentication or user interaction, and the broad scope of affected systems using the vulnerable library. No known exploits in the wild have been reported yet, but the severity and simplicity of exploitation make this a significant threat to healthcare data security. The issue was publicly disclosed and patched in version 6.9.4 of HAPI FHIR.
Potential Impact
The primary impact of CVE-2026-34361 is the unauthorized disclosure of sensitive authentication tokens used to access FHIR servers. This compromises the confidentiality of protected health information (PHI) and other sensitive healthcare data accessible via these servers. Attackers gaining these tokens can impersonate legitimate clients, perform unauthorized queries, modify data if tokens allow, or disrupt healthcare workflows. Although integrity impact is rated lower, stolen tokens could enable limited unauthorized modifications depending on token privileges. Availability is not directly affected by this vulnerability. Globally, healthcare organizations relying on HAPI FHIR for interoperability and data exchange are at risk of data breaches, regulatory non-compliance (e.g., HIPAA, GDPR), reputational damage, and potential financial penalties. The unauthenticated nature and lack of user interaction required for exploitation increase the likelihood of automated attacks and large-scale token theft campaigns. This threat undermines trust in healthcare data exchange platforms and could facilitate further attacks such as ransomware or fraud if attackers leverage stolen tokens for lateral movement within healthcare networks.
Mitigation Recommendations
Organizations should immediately upgrade all HAPI FHIR deployments to version 6.9.4 or later, where this vulnerability is patched. Until upgrades are completed, restrict access to the /loadIG endpoint using network-level controls such as firewalls or API gateways to prevent unauthenticated external access. Review and audit all configured FHIR server URLs to ensure no prefix-overlapping domains exist that could be exploited. Implement strict validation and allowlisting of outbound HTTP requests initiated by the FHIR Validator service. Rotate all authentication tokens (Bearer, Basic, API keys) used by FHIR clients and servers after patching to invalidate any potentially stolen credentials. Employ monitoring and alerting for unusual outbound HTTP requests and token usage patterns. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint. Educate development and security teams about secure URL matching practices to avoid similar logic flaws in future implementations. Finally, conduct penetration testing and code reviews focused on authentication token handling and external request mechanisms.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Sweden, Norway, Switzerland
CVE-2026-34361: CWE-552: Files or Directories Accessible to External Parties in hapifhir org.hl7.fhir.core
Description
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated "/loadIG" endpoint that makes outbound HTTP requests to attacker-controlled URLs. Combined with a startsWith() URL prefix matching flaw in the credential provider (ManagedWebAccessUtils.getServer()), an attacker can steal authentication tokens (Bearer, Basic, API keys) configured for legitimate FHIR servers by registering a domain that prefix-matches a configured server URL. This issue has been patched in version 6.9.4.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
HAPI FHIR is a Java-based implementation of the HL7 FHIR standard widely used for healthcare interoperability. In versions prior to 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated endpoint named /loadIG. This endpoint allows external parties to trigger outbound HTTP requests to arbitrary URLs. The vulnerability arises from a flawed implementation in the credential provider component (ManagedWebAccessUtils.getServer()), which uses a startsWith() method for URL prefix matching. This logic flaw enables an attacker to register a domain name that prefix-matches a legitimate FHIR server URL configured in the system. When the vulnerable service makes requests to the attacker-controlled domain, it inadvertently sends stored authentication tokens (Bearer tokens, Basic Auth credentials, API keys) to the attacker. These tokens can then be stolen and used to access legitimate FHIR servers with elevated privileges. The vulnerability is classified under CWE-552, indicating files or directories accessible to external parties, but here it manifests as unauthorized disclosure of sensitive tokens via crafted HTTP requests. The CVSS v3.1 score is 9.3 (critical), reflecting the high impact on confidentiality, ease of exploitation without authentication or user interaction, and the broad scope of affected systems using the vulnerable library. No known exploits in the wild have been reported yet, but the severity and simplicity of exploitation make this a significant threat to healthcare data security. The issue was publicly disclosed and patched in version 6.9.4 of HAPI FHIR.
Potential Impact
The primary impact of CVE-2026-34361 is the unauthorized disclosure of sensitive authentication tokens used to access FHIR servers. This compromises the confidentiality of protected health information (PHI) and other sensitive healthcare data accessible via these servers. Attackers gaining these tokens can impersonate legitimate clients, perform unauthorized queries, modify data if tokens allow, or disrupt healthcare workflows. Although integrity impact is rated lower, stolen tokens could enable limited unauthorized modifications depending on token privileges. Availability is not directly affected by this vulnerability. Globally, healthcare organizations relying on HAPI FHIR for interoperability and data exchange are at risk of data breaches, regulatory non-compliance (e.g., HIPAA, GDPR), reputational damage, and potential financial penalties. The unauthenticated nature and lack of user interaction required for exploitation increase the likelihood of automated attacks and large-scale token theft campaigns. This threat undermines trust in healthcare data exchange platforms and could facilitate further attacks such as ransomware or fraud if attackers leverage stolen tokens for lateral movement within healthcare networks.
Mitigation Recommendations
Organizations should immediately upgrade all HAPI FHIR deployments to version 6.9.4 or later, where this vulnerability is patched. Until upgrades are completed, restrict access to the /loadIG endpoint using network-level controls such as firewalls or API gateways to prevent unauthenticated external access. Review and audit all configured FHIR server URLs to ensure no prefix-overlapping domains exist that could be exploited. Implement strict validation and allowlisting of outbound HTTP requests initiated by the FHIR Validator service. Rotate all authentication tokens (Bearer, Basic, API keys) used by FHIR clients and servers after patching to invalidate any potentially stolen credentials. Employ monitoring and alerting for unusual outbound HTTP requests and token usage patterns. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint. Educate development and security teams about secure URL matching practices to avoid similar logic flaws in future implementations. Finally, conduct penetration testing and code reviews focused on authentication token handling and external request mechanisms.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-27T13:43:14.368Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cbff80e6bfc5ba1d29f7c3
Added to database: 3/31/2026, 5:08:16 PM
Last enriched: 3/31/2026, 5:23:26 PM
Last updated: 3/31/2026, 6:11:13 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.