CVE-2026-0831

5.3 MEDIUM

📋 TL;DR

The Templately WordPress plugin has an arbitrary file write vulnerability that allows unauthenticated attackers to create .ai.json files in the uploads directory. This affects all versions up to 3.4.8. Attackers can potentially write malicious files that could lead to further exploitation.

💻 Affected Systems

Products:
  • WordPress Templately plugin
Versions: All versions up to and including 3.4.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Templately plugin to be installed and active on WordPress site.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could write web shells or malicious scripts to the uploads directory, potentially leading to remote code execution, site takeover, or data exfiltration.

🟠

Likely Case

Attackers write malicious .ai.json files that could be used for phishing, malware distribution, or as a stepping stone for further attacks.

🟢

If Mitigated

Files are limited to .ai.json extension and uploads directory, reducing immediate code execution risk but still allowing malicious content storage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability is simple to exploit with basic HTTP requests. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.9 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3426051/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Go to Plugins → Installed Plugins
3. Find Templately plugin
4. Click 'Update Now' if available
5. Or download version 3.4.9+ from WordPress repository
6. Deactivate old version and upload new version

🔧 Temporary Workarounds

Disable Templately plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate templately

Restrict uploads directory access

linux

Add .htaccess rules to prevent execution of .ai.json files

Add to wp-content/uploads/.htaccess: <Files "*.ai.json">
  Order Allow,Deny
  Deny from all
</Files>

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests containing suspicious file write patterns to Templately endpoints
  • Monitor uploads directory for unexpected .ai.json file creation and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Templately version. If version is 3.4.8 or lower, site is vulnerable.

Check Version:

wp plugin get templately --field=version

Verify Fix Applied:

Verify Templately plugin version is 3.4.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-json/templately/v2/ai-content/save with suspicious parameters
  • Unexpected .ai.json file creation in wp-content/uploads/ directory

Network Indicators:

  • POST requests to Templately AI content endpoints with crafted session_id, content_id, or ai_page_ids parameters

SIEM Query:

source="web_server" AND (uri_path="/wp-json/templately/v2/ai-content/save" OR uri_path CONTAINS "templately") AND http_method="POST"

🔗 References

📤 Share & Export