VYPR
Critical severityNVD Advisory· Published Oct 2, 2024· Updated Oct 2, 2024

CVE-2024-47806

CVE-2024-47806

Description

Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the aud (Audience) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins OpenId Connect Authentication Plugin fails to validate the `aud` claim, enabling attackers to subvert authentication and potentially gain admin access.

Vulnerability

Overview

CVE-2024-47806 is a missing aud (Audience) claim validation in the Jenkins OpenId Connect Authentication Plugin, versions 4.354.v321ce67a_1de8 and earlier. According to the official description and advisory [1][2], the plugin does not verify that the ID Token's audience claim matches the expected client ID. This flaw allows an attacker to craft or reuse tokens intended for a different relying party, thereby subverting the authentication flow.

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must be able to provide a malicious OpenID Connect ID Token to the Jenkins instance during authentication. The attack does not require prior network access or credentials because the vulnerable plugin will accept a token without verifying its intended audience [2]. By presenting a token with a manipulated aud claim, the attacker can impersonate any user that the token claims to represent.

Impact

Successful exploitation can lead to unauthorized access with any privilege level, including full administrative control of the Jenkins instance [1][2]. Since Jenkins administrators can execute arbitrary scripts and manage configurations, this could result in data exposure, system compromise, or lateral movement within the network.

Mitigation

Jenkins has released version 4.355.vb_ffe5f9ee1c2 of the OpenId Connect Authentication Plugin, which properly checks the aud claim [2]. Users should upgrade immediately. There is no indication that a workaround exists for earlier versions, making upgrading the only effective mitigation.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:oic-authMaven
< 4.355.v3a4.355.v3a

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

1