Description
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, ManagedWebAccessUtils.getServer() uses String.startsWith() to match request URLs against configured server URLs for authentication credential dispatch. Because configured server URLs (e.g., http://tx.fhir.org) lack a trailing slash or host boundary check, an attacker-controlled domain like http://tx.fhir.org.attacker.com matches the prefix and receives Bearer tokens, Basic auth credentials, or API keys when the HTTP client follows a redirect to that domain. This issue has been patched in version 6.9.4.
Published: 2026-03-31
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Credential Leakage via Redirect
Action: Patch
AI Analysis

Impact

HAPI FHIR Core mishandles URL prefix matching when sending authentication credentials. The code compares configured server URLs using a simple string prefix test, ignoring trailing slashes or host boundaries. As a result, a domain that only shares a prefix—such as http://tx.fhir.org.attacker.com—can masquerade as the legitimate server. When a client follows an HTTP redirect to that domain, the server inadvertently dispatches Bearer tokens, Basic authentication credentials, or API keys intended for the real service. The improperly matched URL leads to exposure of sensitive authentication data, enabling attackers to impersonate users or access protected resources.

Affected Systems

The issue affects installations of the HAPI FHIR Core library, specifically versions released prior to 6.9.4. Anyone using the original org.hl7.fhir.core package for healthcare interoperability in Java is vulnerable until the library is upgraded. The bug is tied to the ManagedWebAccessUtils.getServer() component, which was corrected in the 6.9.4 release.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.4, indicating high severity. EPSS scoring shows a probability of exploitation below 1 %, and the vulnerability is not currently listed in the CISA KEV catalog. The attack vector is remote, requiring an attacker to control or manipulate an arbitrary redirect target. A client that follows the HTTP redirect can capture the leaked credentials without needing local access. Given the low EPSS, widespread exploitation is unlikely, but highly motivated attackers or malicious intermediaries could deploy this technique, especially in environments that trust surfaces or that use the library without additional redirect validation.

Generated by OpenCVE AI on April 3, 2026 at 16:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade HAPI FHIR Core to version 6.9.4 or later.

Generated by OpenCVE AI on April 3, 2026 at 16:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fgv2-4q4g-wc35 HAPI FHIR Core has Authentication Credential Leakage via Improper URL Prefix Matching on HTTP Redirect
History

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hapifhir:hl7_fhir_core:*:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Hapifhir
Hapifhir hl7 Fhir Core
Vendors & Products Hapifhir
Hapifhir hl7 Fhir Core

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, ManagedWebAccessUtils.getServer() uses String.startsWith() to match request URLs against configured server URLs for authentication credential dispatch. Because configured server URLs (e.g., http://tx.fhir.org) lack a trailing slash or host boundary check, an attacker-controlled domain like http://tx.fhir.org.attacker.com matches the prefix and receives Bearer tokens, Basic auth credentials, or API keys when the HTTP client follows a redirect to that domain. This issue has been patched in version 6.9.4.
Title HAPI FHIR: Authentication Credential Leakage via Improper URL Prefix Matching on HTTP Redirect in HAPI FHIR Core
Weaknesses CWE-346
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Hapifhir Hl7 Fhir Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T19:09:08.160Z

Reserved: 2026-03-27T13:43:14.368Z

Link: CVE-2026-34359

cve-icon Vulnrichment

Updated: 2026-03-31T19:04:39.513Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T17:16:31.937

Modified: 2026-04-03T13:34:11.017

Link: CVE-2026-34359

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:32Z

Weaknesses