Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. ca.uhn.hapi.fhir/org.hl7.fhir.validation.cli
  4. ›
  5. CVE-2026-33180

CVE-2026-33180: HAPI FHIR HTTP authentication leak in redirects

March 18, 2026

When setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location: response header value.

Sending the same set of headers to subsequent hosts is a problem as this header often contains privacy sensitive information or data that could allow others to impersonate the client’s request.

References

  • github.com/advisories/GHSA-p7m9-v2cm-2h7m
  • github.com/hapifhir/org.hl7.fhir.core
  • github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-p7m9-v2cm-2h7m
  • nvd.nist.gov/vuln/detail/CVE-2026-33180

Code Behaviors & Features

Detect and mitigate CVE-2026-33180 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.9.0

Fixed versions

  • 6.9.0

Solution

Upgrade to version 6.9.0 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

maven/ca.uhn.hapi.fhir/org.hl7.fhir.validation.cli/CVE-2026-33180.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:19:09 +0000.