The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
References
Configurations
No configuration.
History
10 Jan 2026, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-10 10:15
Updated : 2026-01-13 14:03
NVD link : CVE-2026-0831
Mitre link : CVE-2026-0831
CVE.ORG link : CVE-2026-0831
JSON object : View
Products Affected
No product.
CWE
CWE-863
Incorrect Authorization
