The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
Metrics
Affected Vendors & Products
References
History
Sat, 10 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory. | |
| Title | Templately <= 3.4.8 - Unauthenticated Limited Arbitrary JSON File Write | |
| Weaknesses | CWE-863 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-10T09:22:18.126Z
Reserved: 2026-01-09T20:31:20.483Z
Link: CVE-2026-0831
No data.
Status : Received
Published: 2026-01-10T10:15:50.960
Modified: 2026-01-10T10:15:50.960
Link: CVE-2026-0831
No data.
OpenCVE Enrichment
No data.