Description
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location: response header value. Sending the same set of headers to subsequent hosts is a problem as this header often contains privacy sensitive information or data that could allow others to impersonate the client's request. This issue has been patched in release 6.9.0. No known workarounds are available.
Published: 2026-03-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure via leaked authentication headers
Action: Immediate Patch
AI Analysis

Impact

HAPI FHIR’s internal HTTP client mistakenly forwards authentication or other sensitive headers to any hosts specified in a 30X Location header during redirects. This behavior can reveal credentials or other private data to an attacker who controls the redirect target, potentially allowing impersonation of legitimate client requests. The vulnerability is a classic information‑disclosure flaw identified by CWE‑200 and CWE‑201.

Affected Systems

The issue affects the HAPI FHIR library (org.hl7.fhir.core), specifically all versions prior to 6.9.0. Users running these earlier releases are exposed to the risk described.

Risk and Exploitability

With a CVSS score of 7.5 and an EPSS score below 1%, the flaw carries a moderate‑high severity, although exploitation likelihood is relatively low due to the reliance on a redirect response. The vulnerability is not listed in CISA’s KEV catalog. An attacker could exploit the weakness by provoking a redirect to a malicious server; because the attack requires only a standard HTTP request that triggers a redirect, it is considered externally exploitable.

Generated by OpenCVE AI on March 23, 2026 at 13:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update HAPI FHIR to version 6.9.0 or later

Generated by OpenCVE AI on March 23, 2026 at 13:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p7m9-v2cm-2h7m HAPI FHIR HTTP authentication leak in redirects
History

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-201
References
Metrics threat_severity

None

threat_severity

Important


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Hapifhir
Hapifhir hl7 Fhir Core
Vendors & Products Hapifhir
Hapifhir hl7 Fhir Core

Fri, 20 Mar 2026 22:30:00 +0000

Type Values Removed Values Added
Description HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location: response header value. Sending the same set of headers to subsequent hosts is a problem as this header often contains privacy sensitive information or data that could allow others to impersonate the client's request. This issue has been patched in release 6.9.0. No known workarounds are available.
Title HAPI FHIR HTTP authentication leak in redirects
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Hapifhir Hl7 Fhir Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T15:46:35.345Z

Reserved: 2026-03-17T22:16:36.720Z

Link: CVE-2026-33180

cve-icon Vulnrichment

Updated: 2026-03-24T15:46:28.462Z

cve-icon NVD

Status : Deferred

Published: 2026-03-20T23:16:45.020

Modified: 2026-04-28T21:13:28.120

Link: CVE-2026-33180

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-20T22:19:59Z

Links: CVE-2026-33180 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:23Z

Weaknesses