Templately – Gutenberg & Elementor Template Library: 5000+ Free & Pro Ready Templates & Cloud!, CVE-2026-0831
- CVE, Research URL
- Application
- Published on
- Jan 10, 2026
- Research Description
- The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
- Affected versions
-
max 3.4.9.
- Status
-
vulnerable
| Previous vulnerability researches |
|---|
| Login with Azure (Azure SSO) (CVE-2026-2628) , Apr 16, 2026 |
| Login with Azure (Azure SSO) (c6ed33faf4d01e26dafb51a8006cc4f1d3df0c89) , Jun 07, 2024 |