Description
OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.
Published: 2026-04-03
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Token Redemption
Action: Apply Patch
AI Analysis

Impact

OpenClaw versions earlier than 2026.4.2 mistakenly reuse the PKCE verifier as the OAuth state parameter during the Gemini OAuth flow. This design flaw exposes the verifier in the redirect URL, allowing an attacker who captures the redirect to obtain both the authorization code and the PKCE verifier. With these values, the attacker can bypass PKCE protection and redeem an access token. The weakness is a form of improper cryptographic usage identified by CWE‑330.

Affected Systems

The vulnerability impacts OpenClaw software releases before 2026.4.2 that implement the Gemini OAuth flow. All installations of OpenClaw using these versions are susceptible because the PKCE verifier is treated as the state parameter during authentication.

Risk and Exploitability

The CVSS score of 6 denotes moderate severity, and the absence of an EPSS score or KEV listing indicates that no publicly known exploits have been documented yet. Exploitation requires the attacker to intercept the OAuth redirect URL, which can be achieved through network sniffing, a compromised client device, or redirected traffic. No elevated privileges on the OpenClaw server are needed, making the attack relatively straightforward once the redirect is captured. Because the attacker can obtain a valid access token, the potential impact on confidentiality, integrity, and availability is significant if the compromised token is used to access protected resources.

Generated by OpenCVE AI on April 3, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.2 or later.
  • Verify that the OAuth flow no longer uses the PKCE verifier as the state parameter.
  • If an immediate upgrade is not possible, configure the application or its reverse proxy to encode or remove the state parameter from the redirect URL to prevent exposure.
  • Monitor network traffic for suspicious redirect URIs and restrict public access to OAuth endpoints.

Generated by OpenCVE AI on April 3, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9jpj-g8vv-j5mf OpenClaw: Gemini OAuth exposed the PKCE verifier through the OAuth state parameter
History

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.
Title OpenClaw < 2026.4.2 - PKCE Verifier Exposure via OAuth State Parameter
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-330
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T16:57:09.160Z

Reserved: 2026-03-30T13:51:47.549Z

Link: CVE-2026-34511

cve-icon Vulnrichment

Updated: 2026-04-06T16:56:57.771Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T21:17:11.517

Modified: 2026-04-07T13:20:55.200

Link: CVE-2026-34511

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:22:14Z

Weaknesses