CVE-2026-34511 PUBLISHED

OpenClaw < 2026.4.2 - PKCE Verifier Exposure via OAuth State Parameter

Assigner: VulnCheck
Reserved: 30.03.2026 Published: 03.04.2026 Updated: 03.04.2026

OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.4.2 (excl.)
  • Version 2026.4.2 is unaffected

Credits

  • RaaX reporter

References

Problem Types

  • CWE-330 Use of Insufficiently Random Values CWE