Description
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the /loadIG HTTP endpoint in the FHIR Validator HTTP service accepts a user-supplied URL via JSON body and makes server-side HTTP requests to it without any hostname, scheme, or domain validation. An unauthenticated attacker with network access to the validator can probe internal network services, cloud metadata endpoints, and map network topology through error-based information leakage. With explore=true (the default for this code path), each request triggers multiple outbound HTTP calls, amplifying reconnaissance capability. This issue has been patched in version 6.9.4.
Published: 2026-03-31
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Internal Network Discovery via Blind SSRF
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an unauthenticated user to send a crafted JSON body to the /loadIG endpoint of the HAPI FHIR Validator HTTP service. Because the service does not validate the hostname, scheme, or domain of the supplied URL, it performs server‑side HTTP requests to that address. The response errors reveal internal host names or IPs, enabling a remote attacker to probe internal network services, cloud metadata endpoints, and map the topology. The lack of authentication and unchecked outbound traffic makes it a blind SSRF that can be used for reconnaissance rather than direct exploitation.

Affected Systems

The flaw exists in the HAPI FHIR library from hapifhir:org.hl7.fhir.core prior to version 6.9.4. Only deployments that expose the /loadIG endpoint of the FHIR Validator HTTP service are affected without the patch. Systems running 6.9.4 or later are not vulnerable. No other vendors or versions are listed in the CVE record.

Risk and Exploitability

The CVSS score of 5.8 indicates moderate severity; the EPSS score below 1% implies a low probability of exploitation in the wild, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, because the endpoint is reachable over the network and requires no authentication, an unauthenticated attacker can carry out reconnaissance with minimal effort. The primary impact is internal network discovery, which could be a stepping stone to more serious attacks.

Generated by OpenCVE AI on April 3, 2026 at 16:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply HAPI FHIR patch to version 6.9.4 or later.
  • Restrict the /loadIG endpoint to authenticated users or block outbound HTTP requests from the FHIR Validator service.

Generated by OpenCVE AI on April 3, 2026 at 16:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3ww8-jw56-9f5h FHIR Validator: Unauthenticated Blind SSRF via /loadIG Endpoint Enables Internal Network Probing
History

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hapifhir:hl7_fhir_core:*:*:*:*:*:*:*:*

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Hapifhir
Hapifhir hl7 Fhir Core
Vendors & Products Hapifhir
Hapifhir hl7 Fhir Core

Tue, 31 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the /loadIG HTTP endpoint in the FHIR Validator HTTP service accepts a user-supplied URL via JSON body and makes server-side HTTP requests to it without any hostname, scheme, or domain validation. An unauthenticated attacker with network access to the validator can probe internal network services, cloud metadata endpoints, and map network topology through error-based information leakage. With explore=true (the default for this code path), each request triggers multiple outbound HTTP calls, amplifying reconnaissance capability. This issue has been patched in version 6.9.4.
Title HAPI FHIR: Unauthenticated Blind SSRF via /loadIG Endpoint Enables Internal Network Probing
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}


Subscriptions

Hapifhir Hl7 Fhir Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T13:58:24.359Z

Reserved: 2026-03-27T13:43:14.368Z

Link: CVE-2026-34360

cve-icon Vulnrichment

Updated: 2026-04-01T13:58:14.891Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T17:16:32.767

Modified: 2026-04-03T13:15:19.540

Link: CVE-2026-34360

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:31Z

Weaknesses