CVE-2026-34511

MEDIUM

OpenClaw < 2026.4.2 - PKCE Verifier Exposure via OAuth State Parameter

Title source: cna

Description

OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.

Scores

CVSS v3 5.3
EPSS 0.0003
EPSS Percentile 9.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-330
Status published
Products (4)
npm/openclaw 0 - 2026.4.2npm
OpenClaw/OpenClaw < 2026.4.2
openclaw/openclaw < 2026.4.2
OpenClaw/OpenClaw 2026.4.2
Published Apr 03, 2026
Tracked Since Apr 04, 2026