CVE-2024-47806
Description
Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the aud (Audience) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins OpenId Connect Authentication Plugin fails to validate the `aud` claim, enabling attackers to subvert authentication and potentially gain admin access.
Vulnerability
Overview
CVE-2024-47806 is a missing aud (Audience) claim validation in the Jenkins OpenId Connect Authentication Plugin, versions 4.354.v321ce67a_1de8 and earlier. According to the official description and advisory [1][2], the plugin does not verify that the ID Token's audience claim matches the expected client ID. This flaw allows an attacker to craft or reuse tokens intended for a different relying party, thereby subverting the authentication flow.
Exploitation
Prerequisites
To exploit this vulnerability, an attacker must be able to provide a malicious OpenID Connect ID Token to the Jenkins instance during authentication. The attack does not require prior network access or credentials because the vulnerable plugin will accept a token without verifying its intended audience [2]. By presenting a token with a manipulated aud claim, the attacker can impersonate any user that the token claims to represent.
Impact
Successful exploitation can lead to unauthorized access with any privilege level, including full administrative control of the Jenkins instance [1][2]. Since Jenkins administrators can execute arbitrary scripts and manage configurations, this could result in data exposure, system compromise, or lateral movement within the network.
Mitigation
Jenkins has released version 4.355.vb_ffe5f9ee1c2 of the OpenId Connect Authentication Plugin, which properly checks the aud claim [2]. Users should upgrade immediately. There is no indication that a workaround exists for earlier versions, making upgrading the only effective mitigation.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:oic-authMaven | < 4.355.v3a | 4.355.v3a |
Affected products
2- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-49hx-9mm2-7675ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-47806ghsaADVISORY
- www.jenkins.io/security/advisory/2024-10-02/ghsavendor-advisoryWEB
News mentions
1- Jenkins Security Advisory 2024-10-02Jenkins Security Advisories · Oct 2, 2024