Description
The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
Published: 2026-01-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Arbitrary JSON File Write
Action: Patch Now
AI Analysis

Impact

The Templately WordPress plugin is vulnerable because the function that saves a template to a file does not sanitize user-supplied parameters such as session_id, content_id, and ai_page_ids before building a file path. This oversight allows an unauthenticated attacker to cause the plugin to write arbitrary .ai.json files under the uploads directory. The immediate consequence is the creation of files the attacker controls, which could be leveraged to alter plugin behavior, insert malicious configuration data, or trigger script execution if the JSON is subsequently processed by the application.

Affected Systems

WordPress sites that have installed wpdevteam:Templately – Elementor & Gutenberg Template Library in any version up to and including 3.4.8 are affected. The issue resides in the plugin’s core code and can affect any WordPress installation that allows unauthenticated access to the plugin’s save endpoint.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of less than 1% suggests that active exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog, further indicating a lower current threat. The likely attack vector is a remote HTTP request to the plugin’s endpoint, which does not require authentication. The potential impact is the unauthorized creation of files in the uploads directory, giving the attacker the ability to influence the plugin’s function or store malicious data. Overall, while the risk is moderate, the low exploitation probability and lack of authentication requirement heighten awareness but do not necessitate emergency containment measures beyond patching.

Generated by OpenCVE AI on April 15, 2026 at 19:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Templately plugin to version 3.4.9 or later, which removes the unsanitized file path construction.
  • If an immediate upgrade is not possible, disable or delete the Templately plugin entirely to eliminate the vulnerable code path.
  • Implement monitoring of the uploads directory for unexpected .ai.json file creation and review the plugin’s file write operations regularly.

Generated by OpenCVE AI on April 15, 2026 at 19:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpdevteam
Wpdevteam templately
Vendors & Products Wordpress
Wordpress wordpress
Wpdevteam
Wpdevteam templately

Mon, 12 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 10 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
Title Templately <= 3.4.8 - Unauthenticated Limited Arbitrary JSON File Write
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wpdevteam Templately
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:01:43.379Z

Reserved: 2026-01-09T20:31:20.483Z

Link: CVE-2026-0831

cve-icon Vulnrichment

Updated: 2026-01-12T13:09:44.373Z

cve-icon NVD

Status : Deferred

Published: 2026-01-10T10:15:50.960

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0831

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:15:12Z

Weaknesses