The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpdevteam Wpdevteam templately |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpdevteam Wpdevteam templately |
Mon, 12 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 10 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory. | |
| Title | Templately <= 3.4.8 - Unauthenticated Limited Arbitrary JSON File Write | |
| Weaknesses | CWE-863 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-01-10T09:22:18.126Z
Updated: 2026-01-12T13:09:57.883Z
Reserved: 2026-01-09T20:31:20.483Z
Link: CVE-2026-0831
Updated: 2026-01-12T13:09:44.373Z
Status : Received
Published: 2026-01-10T10:15:50.960
Modified: 2026-01-10T10:15:50.960
Link: CVE-2026-0831
No data.