Description
OpenClaw Client PKCE Verifier Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose stored credentials on affected installations of OpenClaw. User interaction is required to exploit this vulnerability in that the target must initiate an OAuth authorization flow.

The specific flaw exists within the implementation of OAuth authorization. The issue results from the exposure of sensitive data in the authorization URL query string. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-29381.
Published: 2026-04-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Information Disclosure
Action: Patch Immediately
AI Analysis

Impact

The flaw resides in the OAuth authorization flow of the OpenClaw client, where a PKCE verifier is inadvertently exposed in the authorization URL query string. This exposure permits a remote actor to read locally stored credentials when the target initiates an authentication request. The consequence is that an attacker obtains credentials that could be used to impersonate the user or access protected resources, effectively escalating privileges on the susceptible system.

Affected Systems

OpenClaw’s client application is affected. Any installation that implements the OAuth flow is vulnerable; the advisory does not specify a version range, so all releases prior to the fix are at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. Exploitation requires user interaction, as the target must start an OAuth authorization flow. An attacker can observe or inject the request to capture the verifier in the query string, so the technical barrier is modest. EPSS data is not available and the vulnerability is not currently listed in CISA’s KEV catalog, suggesting limited exploitation reports. Nonetheless, the exposed credentials can lead to significant compromise if abused.

Generated by OpenCVE AI on April 11, 2026 at 02:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OpenClaw client update that addresses the PKCE verifier information disclosure (see the GitHub advisory and Zero Day Initiative report).
  • If a patch is not yet available, restrict OAuth authorization to trusted clients or disable the PKCE verifier functionality if the client offers that option.

Generated by OpenCVE AI on April 11, 2026 at 02:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw openclaw
Vendors & Products Openclaw
Openclaw openclaw

Sat, 11 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
Description OpenClaw Client PKCE Verifier Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose stored credentials on affected installations of OpenClaw. User interaction is required to exploit this vulnerability in that the target must initiate an OAuth authorization flow. The specific flaw exists within the implementation of OAuth authorization. The issue results from the exposure of sensitive data in the authorization URL query string. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-29381.
Title OpenClaw Client PKCE Verifier Information Disclosure Vulnerability
Weaknesses CWE-200
References
Metrics cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-04-13T17:42:24.369Z

Reserved: 2026-03-07T01:53:31.937Z

Link: CVE-2026-3691

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-11T01:16:16.123

Modified: 2026-04-27T17:10:36.357

Link: CVE-2026-3691

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:49Z

Weaknesses