Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpdevteam Wpdevteam templately |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpdevteam Wpdevteam templately |
Mon, 12 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 10 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory. | |
| Title | Templately <= 3.4.8 - Unauthenticated Limited Arbitrary JSON File Write | |
| Weaknesses | CWE-863 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:01:43.379Z
Reserved: 2026-01-09T20:31:20.483Z
Link: CVE-2026-0831
Updated: 2026-01-12T13:09:44.373Z
Status : Deferred
Published: 2026-01-10T10:15:50.960
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-0831
No data.
OpenCVE Enrichment
Updated: 2026-04-15T19:15:12Z