WebDigit LLMs Index Suite Security & Risk Analysis

wordpress.org/plugins/webdigit-llms-index-suite

Generate llms.txt, llms-full.txt, llms.json and AI-ready image indexes (Markdown + JSON-LD). Public URLs, REST API (ETag), cron and WP-CLI included.

0 active installs v0.2.29 PHP 8.1+ WP 6.2+ Updated Sep 11, 2025
ai-seogeojson-ldllms-txtsitemap
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WebDigit LLMs Index Suite Safe to Use in 2026?

Generally Safe

Score 100/100

WebDigit LLMs Index Suite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The webdigit-llms-index-suite plugin, in version 0.2.29, exhibits a mixed security posture. On the positive side, it demonstrates good practices by not containing dangerous functions, not executing raw SQL queries, and properly escaping a high percentage of its outputs. The absence of file operations and external HTTP requests is also a strong point. Furthermore, the plugin has no recorded vulnerabilities or CVEs, suggesting a history of security diligence or a lack of prior significant issues.

However, there are notable concerns regarding its attack surface. A significant portion of its entry points, specifically 4 out of 5, are unprotected by authentication or permission checks. This includes all 4 REST API routes, which could potentially be exploited by unauthenticated users to access or manipulate data. While taint analysis shows no critical or high severity unsanitized paths, the large number of unprotected entry points, especially REST API endpoints, presents a substantial risk of unauthorized access or denial-of-service attacks if not properly secured at the application level or via WordPress's built-in access controls.

In conclusion, while the plugin's code quality in terms of SQL handling, output escaping, and avoidance of dangerous functions is commendable, the significant unauthenticated attack surface is a critical weakness. The lack of past vulnerabilities is a positive indicator, but it doesn't negate the immediate risk posed by the unprotected REST API routes. Mitigation strategies should focus on ensuring proper authorization for these endpoints.

Key Concerns

  • REST API routes without permission callbacks
  • AJAX handlers without auth checks
  • High percentage of unprotected entry points
Vulnerabilities
None known

WebDigit LLMs Index Suite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WebDigit LLMs Index Suite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
48
226 escaped
Nonce Checks
6
Capability Checks
6
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

82% escaped274 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
render (src\Admin\SettingsPage.php:266)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

WebDigit LLMs Index Suite Attack Surface

Entry Points5
Unprotected4

AJAX Handlers 1

authwp_ajax_wdlis_save_tabsrc\Bootstrap.php:32

REST API Routes 4

GET/wp-json/wdlis/v1/indexsrc\Rest\Routes.php:26
GET/wp-json/wdlis/v1/imagessrc\Rest\Routes.php:39
GET/wp-json/wdlis/v1/faqsrc\Rest\Routes.php:57
GET/wp-json/wdlis/v1/howtosrc\Rest\Routes.php:73
WordPress Hooks 13
actionadd_meta_boxessrc\Admin\Metaboxes.php:18
actionsave_postsrc\Admin\Metaboxes.php:19
actionadmin_menusrc\Admin\SettingsPage.php:12
actionadmin_post_wdlis_save_settingssrc\Admin\SettingsPage.php:13
actionadmin_enqueue_scriptssrc\Admin\SettingsPage.php:14
actionadmin_post_wdlis_generate_nowsrc\Bootstrap.php:28
actionadmin_post_wdlis_flush_rulessrc\Bootstrap.php:29
filtercron_schedulessrc\Cron\Scheduler.php:14
actioninitsrc\Front\Router.php:13
filterquery_varssrc\Front\Router.php:14
actiontemplate_redirectsrc\Front\Router.php:15
actionrest_api_initsrc\Rest\Routes.php:18
actionplugins_loadedwebdigit-llms-index-suite.php:43
Maintenance & Trust

WebDigit LLMs Index Suite Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 11, 2025
PHP min version8.1
Downloads193

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WebDigit LLMs Index Suite Developer Profile

webdigit

4 plugins · 100 total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
17 days
View full developer profile
Detection Fingerprints

How We Detect WebDigit LLMs Index Suite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/webdigit-llms-index-suite/admin/css/settings.css/wp-content/plugins/webdigit-llms-index-suite/admin/js/settings.js
Version Parameters
webdigit-llms-index-suite/admin/css/settings.css?ver=webdigit-llms-index-suite/admin/js/settings.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-wp-nonce
JS Globals
WDLIS
REST Endpoints
/wp-json/wdlis/v1/settings
FAQ

Frequently Asked Questions about WebDigit LLMs Index Suite