PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-5937 IBM CVE debrief

CVE-2016-5937 describes a cross-site request forgery issue in IBM Kenexa LCMS Premier on Cloud. NVD lists affected versions from 9.0 through 10.2 and rates the issue CVSS 3.0 8.8 (High). Because the attack requires a user interaction while the application trusts the resulting request, state-changing functionality may be abused if CSRF protections are missing or ineffective.

Vendor
IBM
Product
CVE-2016-5937
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-01
Original CVE updated
2026-05-13
Advisory published
2017-02-01
Advisory updated
2026-05-13

Who should care

Administrators and security teams running IBM Kenexa LCMS Premier on Cloud, especially environments with authenticated workflows that change content, users, or configuration. Application owners and incident responders should also review any user-driven administrative paths.

Technical summary

NVD classifies the weakness as CWE-352 and maps it to CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The record lists IBM Kenexa LCMS Premier versions 9.0, 9.2, 9.2.1, 9.3, 9.4, 9.5, 10.0, 10.1, and 10.2 as vulnerable. The issue is consistent with a CSRF flaw where a trusted user's browser can be induced to submit unintended requests, potentially affecting confidentiality, integrity, and availability.

Defensive priority

High priority for affected deployments because the issue is network-reachable and can impact authenticated state-changing actions. Prioritize remediation where administrative or workflow endpoints are exposed to regular users.

Recommended defensive actions

  • Apply IBM's remediation referenced in advisory SWG21992067 for affected Kenexa LCMS Premier releases.
  • Review all authenticated, state-changing endpoints for CSRF defenses, including anti-CSRF tokens and server-side request validation.
  • Harden session handling and browser-side protections where applicable, such as SameSite cookie settings, and verify that sensitive actions require explicit re-authentication or confirmation.
  • Audit logs and recent changes for unexpected content, account, workflow, or configuration modifications tied to trusted-user sessions.
  • Confirm which deployed IBM Kenexa LCMS Premier versions match the NVD-listed affected CPEs before and after remediation.

Evidence notes

The debrief is based on the NVD CVE record and the IBM PSIRT advisory reference included in the source item. NVD identifies CWE-352 and lists affected CPEs for Kenexa LCMS Premier 9.0, 9.2, 9.2.1, 9.3, 9.4, 9.5, 10.0, 10.1, and 10.2. The supplied source item shows CVE publication on 2017-02-01 and an NVD modification on 2026-05-13. No exploit details are included here.

Official resources

Publicly disclosed in the CVE record on 2017-02-01T20:59:01.130Z; the NVD entry was last modified on 2026-05-13T00:24:29.033Z.