Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. ca.uhn.hapi.fhir/org.hl7.fhir.utilities
  4. ›
  5. CVE-2026-34359

CVE-2026-34359: HAPI FHIR Core has Authentication Credential Leakage via Improper URL Prefix Matching on HTTP Redirect

March 30, 2026 (updated March 31, 2026)

ManagedWebAccessUtils.getServer() uses String.startsWith() to match request URLs against configured server URLs for authentication credential dispatch. Because configured server URLs (e.g., http://tx.fhir.org) lack a trailing slash or host boundary check, an attacker-controlled domain like http://tx.fhir.org.attacker.com matches the prefix and receives Bearer tokens, Basic auth credentials, or API keys when the HTTP client follows a redirect to that domain.

References

  • github.com/advisories/GHSA-fgv2-4q4g-wc35
  • github.com/hapifhir/org.hl7.fhir.core
  • github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-fgv2-4q4g-wc35
  • nvd.nist.gov/vuln/detail/CVE-2026-34359

Code Behaviors & Features

Detect and mitigate CVE-2026-34359 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.9.4

Fixed versions

  • 6.9.4

Solution

Upgrade to version 6.9.4 or above.

Impact 7.4 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-346: Origin Validation Error

Source file

maven/ca.uhn.hapi.fhir/org.hl7.fhir.utilities/CVE-2026-34359.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:58 +0000.