Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0831: CWE-863 Incorrect Authorization in wpdevteam Templately – Elementor & Gutenberg Template Library: 6500+ Free & Pro Ready Templates And Cloud!

0
Medium
VulnerabilityCVE-2026-0831cvecve-2026-0831cwe-863
Published: Sat Jan 10 2026 (01/10/2026, 09:22:18 UTC)
Source: CVE Database V5
Vendor/Project: wpdevteam
Product: Templately – Elementor & Gutenberg Template Library: 6500+ Free & Pro Ready Templates And Cloud!

Description

The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:43:37 UTC

Technical Analysis

CVE-2026-0831 is an arbitrary file write vulnerability in the Templately plugin for WordPress, affecting all versions up to and including 3.4.8. The root cause is improper authorization and insufficient input validation in the save_template_to_file() function. This function uses user-supplied parameters—session_id, content_id, and ai_page_ids—to construct file paths without sanitizing or validating them properly. As a result, unauthenticated attackers can manipulate these parameters to write arbitrary .ai.json files anywhere within the WordPress uploads directory. Although the vulnerability does not allow direct code execution or disclosure of sensitive data, the ability to write files arbitrarily can be leveraged to inject malicious payloads, modify site content, or facilitate further attacks such as cross-site scripting (XSS) or privilege escalation through chained exploits. The vulnerability is tracked under CWE-863 (Incorrect Authorization), emphasizing the failure to enforce proper access controls. The CVSS v3.1 score is 5.3 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact limited to integrity. No patches or exploits are currently publicly available, but the widespread use of WordPress and this plugin increases the risk of future exploitation.

Potential Impact

The primary impact of CVE-2026-0831 is on the integrity of affected WordPress sites using the Templately plugin. Attackers can write arbitrary files within the uploads directory, potentially allowing them to inject malicious content or scripts that could be executed by the site or visitors. This can lead to website defacement, persistent malware infections, or serve as a foothold for further compromise such as privilege escalation or data manipulation. Although confidentiality and availability are not directly affected, the integrity compromise can undermine trust in the website and cause reputational damage. Organizations relying on this plugin, especially those with high-traffic or sensitive content, face increased risk of targeted attacks. The vulnerability’s ease of exploitation without authentication means that automated scanning and exploitation attempts could emerge rapidly once public proof-of-concept code or exploits appear. This could affect a broad range of sectors including e-commerce, media, education, and government websites that utilize WordPress and this plugin.

Mitigation Recommendations

1. Immediate mitigation involves updating the Templately plugin to a version that addresses this vulnerability once a patch is released by the vendor. 2. Until a patch is available, restrict write permissions on the uploads directory to prevent unauthorized file creation. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing unusual or malformed session_id, content_id, or ai_page_ids parameters. 4. Monitor web server logs for anomalous POST or GET requests targeting the vulnerable plugin endpoints. 5. Employ file integrity monitoring on the uploads directory to detect unauthorized file writes or modifications. 6. Disable or limit the use of the vulnerable plugin if it is not essential to reduce the attack surface. 7. Harden WordPress installations by following best practices such as least privilege for file permissions and disabling unnecessary plugin features. 8. Educate site administrators about the risks and signs of exploitation related to this vulnerability. These steps go beyond generic advice by focusing on specific plugin parameters and file system protections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-09T20:31:20.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69621eda545d6fe96820a5a3

Added to database: 1/10/2026, 9:41:46 AM

Last enriched: 2/26/2026, 6:43:37 PM

Last updated: 3/24/2026, 11:08:54 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses