Vulnerability Description
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated "/loadIG" endpoint that makes outbound HTTP requests to attacker-controlled URLs. Combined with a startsWith() URL prefix matching flaw in the credential provider (ManagedWebAccessUtils.getServer()), an attacker can steal authentication tokens (Bearer, Basic, API keys) configured for legitimate FHIR servers by registering a domain that prefix-matches a configured server URL. This issue has been patched in version 6.9.4.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hapifhir | Hl7 Fhir Core | < 6.9.4 |
Related Weaknesses (CWE)
References
- https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-vr79-8m62ExploitVendor Advisory
FAQ
What is CVE-2026-34361?
CVE-2026-34361 is a vulnerability with a CVSS score of 9.3 (CRITICAL). HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated "/loadIG" en...
How severe is CVE-2026-34361?
CVE-2026-34361 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-34361?
Check the references section above for vendor advisories and patch information. Affected products include: Hapifhir Hl7 Fhir Core.