PatchSiren cyber security CVE debrief
CVE-2016-10143 Tiki CVE debrief
CVE-2016-10143 is a Tiki Wiki CMS 15.2 vulnerability that can let a remote attacker read arbitrary files on the target system by supplying a crafted pathname in a banner URL field. NVD classifies the issue as high severity with confidentiality impact, and the record indicates no privileges or user interaction are required.
- Vendor
- Tiki
- Product
- CVE-2016-10143
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-20
- Advisory updated
- 2026-05-13
Who should care
Administrators and security owners running Tiki Wiki CMS 15.2, especially any internet-facing deployment or instance where banner content can be edited or processed.
Technical summary
The NVD record describes a network-reachable file-read condition in Tiki Wiki CMS 15.2 where a crafted pathname in a banner URL field can expose arbitrary files. NVD maps the issue to CWE-200 and rates it CVSS 3.0 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating a remotely exploitable confidentiality impact without authentication or user interaction.
Defensive priority
High
Recommended defensive actions
- Apply the vendor patch or updated release referenced in the Tiki issue tracker and SourceForge patch record.
- Review any use of banner URL fields and remove or validate inputs that can influence filesystem path handling.
- Restrict administrative access to Tiki configuration and content-management functions where practical.
- Check exposed Tiki Wiki CMS 15.2 instances for suspicious requests involving banner URL values or unexpected file access patterns.
- If you cannot immediately patch, reduce exposure by limiting network access to the application until remediation is complete.
Evidence notes
All statements are based on the supplied NVD record and its listed references. The corpus identifies Tiki Wiki CMS 15.2 as the affected CPE, describes the issue as arbitrary file read through a crafted pathname in a banner URL field, and lists CWE-200 with CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The record was published on 2017-01-20 and marked modified on 2026-05-13. No Exploited in the Wild/KEV data was supplied.
Official resources
-
CVE-2016-10143 CVE record
CVE.org
-
CVE-2016-10143 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Source reference
[email protected] - Permissions Required
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
CVE published: 2017-01-20T08:59:00.127Z. Source and NVD modified: 2026-05-13T00:24:29.033Z. No KEV date was supplied, and the record is not marked as known ransomware campaign use in the provided corpus.