Home

Description

The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-10 | Updated 2026-01-12 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-19:Vendor Notified
2026-01-09:Disclosed

Credits

M Indra Purnama finder

References

www.wordfence.com/...-5dfa-4d72-a032-8b5521c5b8ce?source=cve

plugins.trac.wordpress.org/...ore/Importer/Utils/AIUtils.php

plugins.trac.wordpress.org/...4.5/includes/API/AIContent.php

plugins.trac.wordpress.org/changeset/3426051/

cve.org (CVE-2026-0831)

nvd.nist.gov (CVE-2026-0831)

Download JSON