Description
The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
Problem types
CWE-863 Incorrect Authorization
Product status
* (semver)
Timeline
| 2025-12-19: | Vendor Notified |
| 2026-01-09: | Disclosed |
Credits
M Indra Purnama
References
www.wordfence.com/...-5dfa-4d72-a032-8b5521c5b8ce?source=cve
plugins.trac.wordpress.org/...ore/Importer/Utils/AIUtils.php
plugins.trac.wordpress.org/...4.5/includes/API/AIContent.php
plugins.trac.wordpress.org/changeset/3426051/