The vulnerability exists because OliveTin failed to validate the audience ('aud') claim of JSON Web Tokens (JWTs) when configured to use either a local public key (authJwtPubKeyPath) or an HMAC secret (authJwtHmacSecret). The analysis of the security patch (commit e97d8ecbd8d6) confirms this. The functions parseJwtTokenWithLocalKey and parseJwtTokenWithHMAC in service/internal/auth/otjwt/jwt.go were responsible for parsing these tokens. Originally, they called the jwt.Parse method without providing the required audience validation parameter. This oversight allowed a validly signed token, even if intended for a completely different service, to be accepted for authentication by OliveTin, breaking trust boundaries in multi-service environments. The patch remediates this by introducing a new function, parserOptionsWithAudience, which ensures that the configured audience (authJwtAud) is always passed to the jwt.Parse function, thereby enforcing proper audience validation.