PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8931 IBM CVE debrief

CVE-2016-8931 is a high-severity IBM Kenexa LMS on Cloud vulnerability published on 2017-02-01. NVD describes it as an arbitrary file upload issue that could let a remote attacker execute code on the server. The record maps the flaw to CWE-284 and assigns a CVSS 3.0 score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Vendor
IBM
Product
CVE-2016-8931
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-01
Original CVE updated
2026-05-13
Advisory published
2017-02-01
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for IBM Kenexa LMS deployments, especially environments running affected versions 4.1 through 5.2. Systems exposed to untrusted users or external access should be prioritized for review.

Technical summary

NVD lists the vulnerable IBM Kenexa LMS versions as 4.1, 4.2, 4.2.2, 4.2.3, 4.2.4, 5.0, 5.1, and 5.2. The issue is described as a remote arbitrary file upload condition that could lead to arbitrary code execution on the affected server. NVD classifies the weakness as CWE-284 and records the vulnerability as requiring low attack complexity, with no user interaction and only low privileges.

Defensive priority

High. The combination of remote reachability, code execution impact, and affected enterprise LMS versions makes this a priority remediation item for any environment that still runs the impacted product releases.

Recommended defensive actions

  • Identify whether IBM Kenexa LMS is deployed in your environment and inventory the specific version in use.
  • Compare installed versions against the affected NVD CPE list: 4.1, 4.2, 4.2.2, 4.2.3, 4.2.4, 5.0, 5.1, and 5.2.
  • Apply the IBM PSIRT-referenced patch or vendor guidance from the IBM support advisory.
  • Review any file-upload functionality for least-privilege controls, validation, and access restrictions.
  • Monitor affected hosts for suspicious uploads, unexpected executable content, and signs of unauthorized code execution.
  • If remediation is not immediately possible, restrict access to the application and place compensating controls around upload paths and execution permissions.

Evidence notes

The description, severity, and attack vector are taken from the supplied NVD record. NVD also provides the affected IBM Kenexa LMS version list, CWE-284 mapping, and references to the IBM PSIRT advisory and SecurityFocus entry. The disclosure date used here is the CVE publishedAt timestamp supplied in the corpus (2017-02-01T22:59:00.883Z).

Official resources

Published by CVE/NVD on 2017-02-01. The source corpus also shows later metadata modification on 2026-05-13, which is not the original disclosure date.