PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-10143 Tiki CVE debrief

CVE-2016-10143 is a Tiki Wiki CMS 15.2 vulnerability that can let a remote attacker read arbitrary files on the target system by supplying a crafted pathname in a banner URL field. NVD classifies the issue as high severity with confidentiality impact, and the record indicates no privileges or user interaction are required.

Vendor
Tiki
Product
CVE-2016-10143
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-20
Original CVE updated
2026-05-13
Advisory published
2017-01-20
Advisory updated
2026-05-13

Who should care

Administrators and security owners running Tiki Wiki CMS 15.2, especially any internet-facing deployment or instance where banner content can be edited or processed.

Technical summary

The NVD record describes a network-reachable file-read condition in Tiki Wiki CMS 15.2 where a crafted pathname in a banner URL field can expose arbitrary files. NVD maps the issue to CWE-200 and rates it CVSS 3.0 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating a remotely exploitable confidentiality impact without authentication or user interaction.

Defensive priority

High

Recommended defensive actions

  • Apply the vendor patch or updated release referenced in the Tiki issue tracker and SourceForge patch record.
  • Review any use of banner URL fields and remove or validate inputs that can influence filesystem path handling.
  • Restrict administrative access to Tiki configuration and content-management functions where practical.
  • Check exposed Tiki Wiki CMS 15.2 instances for suspicious requests involving banner URL values or unexpected file access patterns.
  • If you cannot immediately patch, reduce exposure by limiting network access to the application until remediation is complete.

Evidence notes

All statements are based on the supplied NVD record and its listed references. The corpus identifies Tiki Wiki CMS 15.2 as the affected CPE, describes the issue as arbitrary file read through a crafted pathname in a banner URL field, and lists CWE-200 with CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The record was published on 2017-01-20 and marked modified on 2026-05-13. No Exploited in the Wild/KEV data was supplied.

Official resources

CVE published: 2017-01-20T08:59:00.127Z. Source and NVD modified: 2026-05-13T00:24:29.033Z. No KEV date was supplied, and the record is not marked as known ransomware campaign use in the provided corpus.