The Attack Nobody Is Logging: Server-Side Request Forgery in Healthcare
Why EHR Integration APIs Are the Perfect SSRF Host
- Core EHR platforms like Epic, Oracle Health or Cerner, Meditech, MEDITECH Expanse.
- The lab information system exchanges results via HL7 and FHIR APIs.
- Radiology and PACS platforms receiving orders and return imaging results.
- Pharmacy management systems processing prescription data.
- Patient portal applications consuming FHIR R4 or R5 endpoints.
- Revenue cycle management structures associated with coverage clearing houses.
- Telehealth platforms pulling patient histories.
- Cloud data lakes for analytics, ML model training, and population health.
Critical SSRF Vulnerabilities in FHIR Systems
CVE-2026-34360, Blind SSRF via Unauthenticated/loadIGendpoint (CVSS 5.8)
/loadIGendpoint. This endpoint accepts a user – supplied URL in a JSON POST body and makes an outbound HTTP request to it, and using no authentication requirements, no hostname validation, no allowlisting. explore=trueis the default for this code path, every single request triggers multiple outbound HTTP calls, dramatically amplifying the attacker’s reconnaissance capabilities. //TODO gets this from fhir settingsin the relevant security control, confirming that it was an incomplete, unfinished security implementation that shipped to production. CVE-2026-34361, SSRF Chains with Auth Token Theft (CVSS 9.3 Critical)
/loadIGendpoint, but this CVE describes a chained attack that goes from SSRF reconnaissance to credential theft. ManagedWebAccessUtils.getServer()uses astartsWith()check to decide whether or not to attach authentication certificates with an outbound HTTP request. The logic here is to attach credentials if the destination URL starts with a configured server URL. POSTrequest to/loadIGpointing to their domain. - No Credentials
- No user interaction
- Network access to HAPI FHIR Instance
- Approximately about 30 seconds of setup
CVE-2026-34359, Auth Credit Leakage via HTTP redirection (related)
301/302/307/308redirect,setHeaders()re-evaluates the credential provider against the new URL at each redirect hop. An Attacker-controlled redirect chain can therefore result in stealing credentials across multiple hops, even if the initial URL doesn’t prefix-match a configured server. SimpleHTTPClientof the HAPI FHIR follows up to 5 redirects. That is five opportunities for harvesting credentials. CVE-2026-33180, HTTP Authentication Leak in Redirects (separate vector)
What an Attacker Does With a Compromised FHIR Auth Token
Stage 1: Token capture thru CVE-2026-34361
POST.They receive a Bearer token for a production FHIR server, the same token that authorizes access to patient demographics, diagnoses, medications, lab effects, and care plans. Stage 2: Patient Record Enumeration
GET /patient?_count=1000, GET /Observation?patient=*, GET /MedicationRequest?patient=*.FHIR’s RESTful design means every resource type is a clean and predictable endpoint. A scripted bulk download of PHI takes minutes. Stage 3: Supply Chain Poisoning (Through stolen package registry credentials).
Stage 4: Lateral movement via Internal network probing (CVE-2026-34360)
Stage 5: Cloud Credential Extraction
- AWS: http://169.254.169.254/latest/meta-data/iam/security-credentials/
- Azure: http://169.254.169.254/metadata/identity/oauth2/token/
- GCP: http://metadata.google.internal/computeMetadata/v1/
Where SSRF Exists Beyond FHIR in Healthcare
Telehealth Platform Image/Document Import Features
EHR Webhook and Callback Integrations
Revenue Cycle Management API URL Parameters
DICOM And Imaging System HTTP Integrations
AI-Powered Healthcare Assistants In Clinical Portals
Why Your Current Security Stack Cannot See SSRF Attacks
- http://169.254.169.254/ encoded as http://0xA9.0xFE.0xA9.0xFE/
- http://169.254.169.254/ encoded in decimal: http://2852039166/
- DNS rebinding: attacker registers internal.attacker.com with a short TTL that resolves to the metadata IP after the DNS check passes.
- Redirect chains: attacker's server returns a 301 to the metadata URL.
- URL shorteners, open redirectors, IPv6 representations.
How to Prevent SSRF Attacks in Healthcare APIs
At the WAF/WAAP Layer - What Prophaze Enforces
-
Inspection Of Outbound Request URL And Allowlisting At The API Layer: Each API endpoint that accepts URL parameters or performs server-side fetches must have a defined allowlist of valid destination domain names.Prophaze enforces this at the WAF layer by normalizing and validating URL parameters before backend processing Any outgoing requests that fall outside the described pattern It is blocked and flagged before reaching the application, so that SSRF is quickly prevented.
-
Block private IP and metadata endpoints with bypass-resistant patterns: Simple IP block lists fail because of encoding tricks. Prophaze evaluates the canonical form of URLs after decoding, redirect resolution and DNS validation not just raw input. This ensures that internal IP ranges and metadata endpoints are blocked even under obfuscation attempts.
-
Behavioral anomaly detection with API baseline: Prophaze learns which URLs each API endpoint is expected to call and creates a behavioral baseline. For example, an FHIR endpoint such as
/loadIGtypically communicates with a small, trusted set of domains. If it suddenly leads to a newly registered or unknown domain, the deviation will be flagged in real time,even if the request appears legitimate. -
Credential token exfiltration detection: Prophaze Monitors API responses to patterns matching Bearer tokens, API keys, or Authorization headers. If credentials appear in responses, especially in outbound flows, it flags potential leakage, helping detect SSRF-driven data exfiltration (with CVE-2026-34361 attack chains).
-
Virtual patching for unpatched FHIR Instances: Healthcare systems often cannot patch immediately due to operational constraints. Prophaze gives digital patching at the WAF layer, blocking the exploits of CVE-2026-34361 and CVE-2026-34360 while the patch cycles are in progress.
-
East West monitoring in Kubernetes environments : Beyond perimeter protection, Prophaze monitors internal (east-west) visitors in Kubernetes-based FHIR deployments. This enables the discovery of SSRF pivots between microservices,activities that traditional north-south WAFs typically bypass.
At the Architecture Layer - What Healthcare Teams Must Do
-
Upgrade HAPI FHIR to 6.9.4 or above: This patches CVE-2026-34360, CVE-2026-34361, CVE-2026-34359, and CVE-2026-33180. If you are running HAPI FHIR and have not checked your version, do it now. The CISA marking of CVE-2026-34361 as "Automatable: yes" means automated scanning and exploitation campaigns are either already running or imminent.
-
Configure allowedDomains in the HAPI FHIR Validator HTTP service: The fix is available. The GHSA advisory recommends restricting outbound requests to known FHIR registries (packages.fhir.org, hl7.org) by default, requiring explicit opt-in for open access.
-
Enforce IMDSv2 on all cloud-hosted healthcare infrastructure: AWS IMDSv2 requires a session token for metadata requests, which breaks the SSRF-to-metadata-credential-theft chain at the cloud layer. If your hospital's FHIR servers, EHR integration middleware, or telehealth platforms run on EC2 and are not using IMDSv2, a successful SSRF against any application on those instances exposes your cloud credentials. This is a mandatory configuration change.
-
Network-segment FHIR validator services: The
/loadIGendpoint should not be reachable from the public internet, from patient-facing network segments, or from untrusted internal VLANs. Restrict network access to the HAPI FHIR HTTP service to trusted clinical integration servers only. -
Audit every URL-accepting parameter in your EHR integration APIs: Conduct a targeted code review or penetration test specifically looking for SSRF: any parameter that accepts a URL, any import/fetch/callback functionality, any webhook configuration interface. These are your SSRF candidates. Document them. Apply input validation. Test bypass resistance.
What This Means for Healthcare CISOs in 2026
Quick Reference: HAPI FHIR SSRF CVE Summary (March–April 2026)
Can your security platform actually detect and stop SSRF across your EHR integration layer?
- One malicious API request. Would you catch where it’s going?