CVE-2026-34511

OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.
Configurations

No configuration.

History

03 Apr 2026, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 21:17

Updated : 2026-04-07 13:20


NVD link : CVE-2026-34511

Mitre link : CVE-2026-34511

CVE.ORG link : CVE-2026-34511


JSON object : View

Products Affected

No product.

CWE
CWE-330

Use of Insufficiently Random Values