PT-2026-30235 · Openclaw · Openclaw
Raax
·
Published
2026-04-03
·
Updated
2026-04-03
·
CVE-2026-34511
CVSS v3.1
5.3
Medium
| AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N |
OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.
Fix
Use of Insufficiently Random Values
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw