#VU125263 Information disclosure in OpenClaw - CVE-2026-34511

 

#VU125263 Information disclosure in OpenClaw - CVE-2026-34511

Published: April 8, 2026


Vulnerability identifier: #VU125263
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-34511
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote attacker to redeem OAuth tokens.

The vulnerability exists due to exposure of sensitive information in the Gemini OAuth flow when handling the OAuth redirect. A remote attacker can capture the redirect URL to redeem OAuth tokens.

The issue defeats PKCE interception protection because the PKCE verifier is reused as the OAuth state value and reflected back in the redirect URL alongside the authorization code.


Remediation

Install security update from vendor's website.

External links