CVE-2024-47806
Java vulnerability analysis and mitigation

Overview

The Jenkins OpenId Connect Authentication Plugin versions 4.354.v321ce67a_1de8 and earlier contain a high-severity vulnerability (CVE-2024-47806) discovered in October 2024. The vulnerability stems from the plugin's failure to validate the aud (Audience) claim of an ID Token during the authentication flow, which is meant to verify that the token is issued for the correct client (Jenkins Advisory).

Technical details

The vulnerability exists in the authentication flow of the OpenId Connect Authentication Plugin where it fails to perform proper validation of the aud (Audience) claim in ID Tokens. This claim is crucial for verifying that the token was issued for the intended client. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (High) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability could allow attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins instances. This represents a significant security risk as it could lead to complete compromise of the Jenkins server (SecurityWeek, Security Online).

Mitigation and workarounds

Users are strongly advised to update to OpenId Connect Authentication Plugin version 4.355.v3a_fb_fca_b_96d4, which implements proper validation of the aud (Audience) claim during the ID Token authentication flow (Jenkins Advisory).

Community reactions

The security community has emphasized the severity of this vulnerability alongside other Jenkins security issues discovered in the same timeframe. Security researchers and industry experts have urged immediate updates to affected systems (SecurityWeek).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-15104MEDIUM6.9
  • JavaScriptJavaScript
  • vnu-jar
NoNoJan 16, 2026
CVE-2026-1002MEDIUM6.9
  • JavaJava
  • apicurio-registry
NoYesJan 15, 2026
CVE-2025-66169MEDIUM5.3
  • JavaJava
  • org.apache.camel:camel-neo4j
NoYesJan 14, 2026
CVE-2026-0858MEDIUM5.1
  • JavaJava
  • net.sourceforge.plantuml:plantuml
NoYesJan 16, 2026
CVE-2026-0976LOW3.7
  • JavaJava
  • keycloak
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management