[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f3e8f0iGSAgwtZlbKBHSwTYW5h7ZnK077AqlixVyVL9g":3,"$fCohel4LYHITRAmP1txUtho1n8XdaxiDhYyQuSis5Xd8":475,"$f_nQn_aVEFBzFevG11PU8wCfrkY7xtMFIH-XWwLgbcI8":479},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"discovery_status":32,"vulnerabilities":33,"developer":99,"crawl_stats":39,"alternatives":105,"analysis":191,"fingerprints":457},"website-llms-txt","Website LLMs.txt","8.2.7","Ryan Howard","https:\u002F\u002Fprofiles.wordpress.org\u002Fryhowa\u002F","\u003Cp>\u003Cstrong>Website LLMs.txt\u003C\u002Fstrong> generates and manages an \u003Ccode>llms.txt\u003C\u002Fcode> file, a structured, AI-ready index that helps large language models like ChatGPT, Claude, and Perplexity understand your site’s most important content.\u003C\u002Fp>\n\u003Ch3>How llms.txt works\u003C\u002Fh3>\n\u003Cp>Traditional sitemaps and robots files guide search engines. But as AI-driven systems such as ChatGPT, Claude, and Perplexity increasingly ingest web content, they benefit from a clear, structured list of a site’s most important URLs.\u003Cbr \u002F>\n    llms.txt offers that: a plain-text or Markdown list of essential public URLs, optionally annotated with titles, descriptions, and grouping, designed for AI consumption rather than general web crawling.\u003C\u002Fp>\n\u003Ch3>Key benefits\u003C\u002Fh3>\n\u003Cp>✅ \u003Cstrong>AI discovery readiness\u003C\u002Fstrong> — future-proof your site for AI indexing and content retrieval.\u003Cbr \u002F>\n✅ \u003Cstrong>Fully automatic\u003C\u002Fstrong> — the plugin builds and updates your \u003Ccode>llms.txt\u003C\u002Fcode> file on its own schedule.\u003Cbr \u002F>\n✅ \u003Cstrong>SEO plugin integration\u003C\u002Fstrong> — works seamlessly with Yoast SEO, Rank Math, SEOPress, and AIOSEO, automatically excluding content marked as \u003Cem>noindex\u003C\u002Fem> or \u003Cem>nofollow\u003C\u002Fem>.\u003Cbr \u002F>\n✅ \u003Cstrong>Advanced controls\u003C\u002Fstrong> — choose post types, customize file titles or descriptions, attach optional Markdown files, and trigger manual regeneration.\u003Cbr \u002F>\n✅ \u003Cstrong>Developer-friendly\u003C\u002Fstrong> — includes filters such as \u003Ccode>llms_generator_get_post_meta_description\u003C\u002Fcode> for description logic, performance tuning, and custom indexing behavior.\u003Cbr \u002F>\n✅ \u003Cstrong>AI crawler detection\u003C\u002Fstrong> — opt in to track whether GPTBot, ClaudeBot, or PerplexityBot are actually reading your site’s \u003Ccode>llms.txt\u003C\u002Fcode>.\u003Cbr \u002F>\n✅ \u003Cstrong>WooCommerce & multisite ready\u003C\u002Fstrong> — respects product visibility rules and scales easily across large or networked sites.\u003Cbr \u002F>\n✅ \u003Cstrong>Privacy-first experiment\u003C\u002Fstrong> — anonymous, encrypted telemetry helps reveal which bots are accessing \u003Ccode>llms.txt\u003C\u002Fcode> files across the web.\u003C\u002Fp>\n\u003Ch3>Activation & setup\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Activate the plugin.\u003C\u002Fli>\n\u003Cli>Visit \u003Cem>Settings \u003Cspan aria-hidden=\"true\" class=\"wp-exclude-emoji\">→\u003C\u002Fspan> LLMs.txt\u003C\u002Fem> to configure post types, update frequency (immediate, daily, or weekly), and optional crawler logging.\u003C\u002Fli>\n\u003Cli>The plugin generates \u003Ccode>llms.txt\u003C\u002Fcode> (and optionally \u003Ccode>llms-full.txt\u003C\u002Fcode>) and serves it from your site root.\u003C\u002Fli>\n\u003Cli>Content updates trigger automatic regeneration. All noindex\u002Fnofollow rules from your SEO plugin are respected.\u003C\u002Fli>\n\u003Cli>If you enable AI crawler logging, local and global logs record each visit from known AI bots — viewable right inside your WordPress dashboard.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Use cases for llms.txt\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Publishers, SaaS companies, developers, and documentation sites that want to make their content easier for AI systems to interpret.\u003C\u002Fli>\n\u003Cli>SEO-driven websites teting AI engine optimization tactics.\u003C\u002Fli>\n\u003Cli>Agencies and site owners preparing for the next phase of AI search and retrieval.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>The llms.txt experiment & further reading\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fcompleteseo.com\u002Fare-ai-bots-actually-reading-llms-txt-files\u002F\" rel=\"nofollow ugc\">Are AI bots actually reading llms.txt files?\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fcompleteseo.com\u002Feverything-we-know-about-llms-txt\u002F\" rel=\"nofollow ugc\">Everything we know about llms.txt\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","Automatically generate and manage LLMS.txt files for LLM\u002FAI content understanding, with full Yoast SEO, Rank Math, SEOPress, and AIOSEO integration.",30000,375486,94,11,"2026-03-13T18:44:00.000Z","6.8.5","5.8","7.2",[20,21,22,23,24],"ai","llm","rankmath","seo","yoast","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.7.zip",96,3,0,"2026-04-20 18:26:20","2026-04-16T10:56:18.058Z","no_bundle",[34,64,82],{"id":35,"url_slug":36,"title":37,"description":38,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":6,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":30,"updated_date":45,"references":46,"days_to_patch":48,"patch_diff_files":49,"patch_trac_url":39,"research_status":54,"research_verified":55,"research_rounds_completed":28,"research_plan":56,"research_summary":57,"research_vulnerable_code":58,"research_fix_diff":59,"research_exploit_outline":60,"research_model_used":61,"research_started_at":62,"research_completed_at":63,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":55,"poc_model_used":39,"poc_verification_depth":39},"CVE-2026-6712","website-llmstxt-authenticated-admin-stored-cross-site-scripting","Website LLMs.txt \u003C= 8.2.6 - Authenticated (Admin+) Stored Cross-Site Scripting","The Website LLMs.txt plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 8.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",null,"\u003C=8.2.6","medium",4.4,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2026-04-21 06:44:02",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F2ab86a42-2a8f-4cbc-a754-a3e307b1b73f?source=api-prod",1,[50,51,52,53],"README.txt","admin\u002Fadmin-page.php","includes\u002Fclass-llms-generator.php","website-llms-txt.php","researched",false,"# Exploitation Research Plan: CVE-2026-6712\n\n## 1. Vulnerability Summary\nThe **Website LLMs.txt** plugin (\u003C= 8.2.6) is vulnerable to **Authenticated (Admin+) Stored Cross-Site Scripting (XSS)**. The vulnerability exists in the admin settings page where post type names (labels) for the `llms.txt` file can be customized. Specifically, the plugin fails to sanitize the input when saving settings via the WordPress Settings API and fails to escape the output when rendering these values back into the `value` attribute of input fields in the admin dashboard.\n\nThis is particularly critical in WordPress Multisite environments or installations where `unfiltered_html` is disabled for administrators, as it allows them to bypass these restrictions and execute arbitrary scripts in the context of other administrative users.\n\n## 2. Attack Vector Analysis\n- **Vulnerable Page**: The plugin's settings page, typically found at `\u002Fwp-admin\u002Foptions-general.php?page=llms-generator` (inferred slug based on \"Settings → LLMs.txt\").\n- **Vulnerable Parameter**: `llms_generator_settings[post_name][POST_TYPE_LABEL]`\n- **Authentication Requirement**: Administrator (with permissions to manage plugin settings).\n- **Vulnerable Sink**: `admin\u002Fadmin-page.php` at line 107 and line 124.\n- **Preconditions**: The plugin must be active. The exploit is most relevant when the user is an Administrator in a context where `unfiltered_html` is disabled (e.g., Multisite).\n\n## 3. Code Flow\n1. **Entry Point (Input)**: The user submits the settings form in the admin dashboard. The form targets `options.php` (standard WordPress Settings API).\n2. **Persistence**: WordPress saves the `llms_generator_settings` array into the `wp_options` table. Due to missing or insufficient sanitization callbacks during `register_setting` (inferred), malicious HTML tags\u002Fattributes are stored.\n3. **Processing**: The plugin loads settings using `get_option('llms_generator_settings')` inside the `LLMS_Generator` constructor (`includes\u002Fclass-llms-generator.php`, line 24).\n4. **Sink (Output)**: When an admin visits the settings page, `admin\u002Fadmin-page.php` iterates through the available post types.\n5. **Vulnerable Execution**:\n   - At line 107 (for ordered types):\n     ```php\n     \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_html($post_type->labels->name); ?>]\" value=\"\u003C?php echo $settings['post_name'][esc_html($post_type->labels->name)] ?? ''  ?>\"\u002F>\n     ```\n   - The value is echoed directly into the `value` attribute without using `esc_attr()`. This allows an attacker to break out of the attribute using `\">` and inject a script.\n\n## 4. Nonce Acquisition Strategy\nThe settings form uses the WordPress Settings API, which requires a nonce generated for the `llms_generator_settings-options` action.\n\n1. **Identify Page**: Navigate to the settings page `\u002Fwp-admin\u002Foptions-general.php?page=llms-generator` (or use `browser_navigate` to find the correct `options-general.php` submenu link).\n2. **Extract Nonce**: Since we are performing an authenticated exploit as Admin, we use the `browser_eval` tool to extract the nonce from the hidden input field generated by `settings_fields('llms_generator_settings')`.\n3. **JavaScript Execution**:\n   ```javascript\n   \u002F\u002F Extract the nonce from the settings form\n   const nonce = document.querySelector('input[name=\"_wpnonce\"]').value;\n   const referer = document.querySelector('input[name=\"_wp_http_referer\"]').value;\n   return { nonce, referer };\n   ```\n\n## 5. Exploitation Strategy\n### Step-by-Step Plan\n1. **Login**: Authenticate as an Administrator.\n2. **Access Settings**: Navigate to the LLMs.txt settings page to retrieve the required nonces and verify the correct post type labels (usually \"Posts\").\n3. **Payload Construction**:\n   - Target Parameter: `llms_generator_settings[post_name][Posts]` (assuming the \"Post\" type has the label \"Posts\").\n   - Payload: `\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>`\n4. **Submit Exploit**: Send a POST request to `\u002Fwp-admin\u002Foptions.php` using the `http_request` tool.\n5. **Verify Injection**: Navigate back to the settings page to trigger the script execution.\n\n### HTTP Request Details\n- **URL**: `http:\u002F\u002F\u003Ctarget>\u002Fwp-admin\u002Foptions.php`\n- **Method**: `POST`\n- **Content-Type**: `application\u002Fx-www-form-urlencoded`\n- **Parameters**:\n  - `option_page`: `llms_generator_settings`\n  - `action`: `update`\n  - `_wpnonce`: `[EXTRACTED_NONCE]`\n  - `_wp_http_referer`: `\u002Fwp-admin\u002Foptions-general.php?page=llms-generator`\n  - `llms_generator_settings[post_types][]`: `post` (Ensures the 'post' type is active)\n  - `llms_generator_settings[post_name][Posts]`: `\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>`\n\n## 6. Test Data Setup\n1. **Plugin Activation**: Ensure `website-llms-txt` is installed and activated.\n2. **User Creation**: Ensure an Administrator user exists.\n3. **Target Post Type**: Ensure the default \"Post\" type exists (standard in WP).\n4. **(Optional) Restriction**: To prove the severity, disable `unfiltered_html` for admins in `wp-config.php`:\n   ```php\n   define( 'DISALLOW_UNFILTERED_HTML', true );\n   ```\n\n## 7. Expected Results\n- After the POST request, WordPress should return a 302 redirect back to the settings page with `settings-updated=true`.\n- Upon following the redirect or visiting the settings page manually, the HTML source at the vulnerable input field will look like:\n  ```html\n  \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][Posts]\" value=\"\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>\"\u002F>\n  ```\n- A JavaScript alert box showing the document domain will appear in the browser.\n\n## 8. Verification Steps\n1. **Database Check**: Use WP-CLI to verify the payload is stored in the options table:\n   ```bash\n   wp option get llms_generator_settings --format=json\n   ```\n   Check if the `post_name` object contains the script tag for the \"Posts\" key.\n2. **Source Inspection**: Use `http_request` to GET the settings page and grep for the script tag:\n   ```bash\n   # Check if the script tag is present in the response body\n   grep \"\u003Cscript>alert(document.domain)\u003C\u002Fscript>\"\n   ```\n\n## 9. Alternative Approaches\n- **Multisite Context**: If the environment is a Multisite, perform the same steps as a Blog Admin. The script will execute when a Super Admin visits the site settings, potentially leading to Super Admin privilege escalation.\n- **Other Settings**: Check for other fields in `admin\u002Fadmin-page.php` that use `$settings`. For example, `llms_txt_title` or `llms_txt_description`. If they are also rendered without escaping, they serve as alternative injection points.\n  - Potential sink: `llms_txt_title` field at `admin\u002Fadmin-page.php:191` (inferred location in settings form).","The Website LLMs.txt plugin for WordPress is vulnerable to Stored Cross-Site Scripting via administrative settings in versions up to 8.2.6. This occurs because the plugin does not properly sanitize input or escape output for custom post type labels and file description fields, allowing administrators (particularly in multisite or restricted environments) to inject arbitrary JavaScript that executes in the context of other administrative users.","\u002F\u002F admin\u002Fadmin-page.php line 107 and 124\n\u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_html($post_type->labels->name); ?>]\" value=\"\u003C?php echo $settings['post_name'][esc_html($post_type->labels->name)] ?? ''  ?>\"\u002F>\n\n---\n\n\u002F\u002F admin\u002Fadmin-page.php line 317\n\u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo (isset($settings['llms_txt_title']) ? $settings['llms_txt_title'] : '') ?>\u003C\u002Ftextarea>\n\n---\n\n\u002F\u002F includes\u002Fclass-llms-generator.php line 468\nif(isset($this->settings['post_name'][$post_type_obj->labels->name]) && $this->settings['post_name'][$post_type_obj->labels->name]) {\n    $name = $this->settings['post_name'][$post_type_obj->labels->name];\n}","diff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.6\u002Fadmin\u002Fadmin-page.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.7\u002Fadmin\u002Fadmin-page.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.6\u002Fadmin\u002Fadmin-page.php\t2026-02-11 11:25:06.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.7\u002Fadmin\u002Fadmin-page.php\t2026-03-13 18:44:40.000000000 +0000\n@@ -102,7 +102,7 @@\n                                 \u003Cdiv class=\"sortable-item active\" data-post-type=\"\u003C?php echo esc_attr($post_type->name); ?>\">\n                                     \u003Clabel>\n                                         \u003Cinput type=\"checkbox\" name=\"llms_generator_settings[post_types][]\" value=\"\u003C?php echo esc_attr($post_type->name); ?>\" checked>\n-                                        \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_html($post_type->labels->name); ?>]\" value=\"\u003C?php echo $settings['post_name'][esc_html($post_type->labels->name)] ?? ''  ?>\"\u002F>\n+                                        \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_attr($post_type->labels->name); ?>]\" value=\"\u003C?php echo esc_attr($settings['post_name'][$post_type->labels->name] ?? '')  ?>\"\u002F>\n                                         \u003Cspan class=\"dashicons dashicons-menu\">\u003C\u002Fspan>\n                                         \u003C?php echo esc_html($post_type->labels->name); ?>\n                                         \u003Csmall style=\"opacity: 0.7;\">(\u003C?php echo intval($indexed_count) . ' indexed of ' . intval($all_count); ?>)\u003C\u002Fsmall>\n@@ -117,7 +117,7 @@\n                             \u003Cdiv class=\"sortable-item\" data-post-type=\"\u003C?php echo esc_attr($post_type->name); ?>\">\n                                 \u003Clabel>\n                                     \u003Cinput type=\"checkbox\" name=\"llms_generator_settings[post_types][]\" value=\"\u003C?php echo esc_attr($post_type->name); ?>\"\u002F>\n-                                    \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_html($post_type->labels->name); ?>]\" value=\"\u003C?php echo $settings['post_name'][esc_html($post_type->labels->name)] ?? ''  ?>\"\u002F>\n+                                    \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_attr($post_type->labels->name); ?>]\" value=\"\u003C?php echo esc_attr($settings['post_name'][$post_type->labels->name] ?? '')  ?>\"\u002F>\n                                     \u003Cspan class=\"dashicons dashicons-menu\">\u003C\u002Fspan>\n                                     \u003C?php echo esc_html($post_type->labels->name); ?>\n                                     \u003Csmall style=\"opacity: 0.7;\">(\u003C?php echo intval($indexed_count) . ' indexed of ' . intval($all_count); ?>)\u003C\u002Fsmall>\n@@ -314,28 +314,28 @@\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt Title', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo (isset($settings['llms_txt_title']) ? $settings['llms_txt_title'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo esc_textarea($settings['llms_txt_title'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Set a custom title for your LLMs.txt file. This will appear at the top of the generated file before any listed URLs.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_txt_description']) ? $settings['llms_txt_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_txt_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Optional introduction text added before the list of URLs. Use this to explain the purpose or structure of your LLMs.txt file.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt After Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_after_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_after_txt_description']) ? $settings['llms_after_txt_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_after_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_after_txt_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Optional text inserted right before the list of links or content entries. You can use it to add additional notes, context, or data usage information before the URLs begin.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt End File Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_end_file_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_end_file_description']) ? $settings['llms_end_file_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_end_file_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_end_file_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Final text appended at the bottom of the LLMs.txt file (e.g. footer, contact, or disclaimer information).', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>","The exploit requires administrative privileges. \n\n1. Authenticate to the WordPress admin dashboard.\n2. Navigate to the plugin settings page (Settings -> LLMs.txt) and locate the \"Post Types\" or \"LLMS.txt Title\" fields.\n3. Identify the nonce for the settings API (generated by `settings_fields('llms_generator_settings')`).\n4. Craft a payload to break out of the HTML attribute, such as `\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>`. \n5. Submit a POST request to `\u002Fwp-admin\u002Foptions.php` with the parameter `llms_generator_settings[post_name][Posts]` (or another field like `llms_txt_title`) containing the payload, along with the valid `_wpnonce` and `_wp_http_referer`.\n6. To trigger the XSS, navigate back to the settings page at `\u002Fwp-admin\u002Foptions-general.php?page=llms-generator`. The browser will execute the injected script because the plugin fails to use `esc_attr()` or `esc_textarea()` when echoing the stored setting value.","gemini-3-flash-preview","2026-04-27 14:10:21","2026-04-27 14:10:53",{"id":65,"url_slug":66,"title":67,"description":68,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":6,"severity":41,"cvss_score":69,"cvss_vector":70,"vuln_type":44,"published_date":71,"updated_date":45,"references":72,"days_to_patch":48,"patch_diff_files":74,"patch_trac_url":39,"research_status":54,"research_verified":55,"research_rounds_completed":28,"research_plan":75,"research_summary":76,"research_vulnerable_code":77,"research_fix_diff":78,"research_exploit_outline":79,"research_model_used":61,"research_started_at":80,"research_completed_at":81,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":55,"poc_model_used":39,"poc_verification_depth":39},"CVE-2026-6711","website-llmstxt-reflected-cross-site-scripting-2","Website LLMs.txt \u003C= 8.2.6 - Reflected Cross-Site Scripting","The Website LLMs.txt plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 8.2.6. This is due to the use of filter_input() without a sanitization filter and insufficient output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","2026-04-20 00:00:00",[73],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff5af155b-b65e-4cb1-a748-fc0fc5c6176d?source=api-prod",[50,51,52,53],"# Exploitation Research Plan: CVE-2026-6711 - Reflected XSS in Website LLMs.txt\n\n## 1. Vulnerability Summary\nThe **Website LLMs.txt** plugin for WordPress (versions \u003C= 8.2.6) contains a reflected Cross-Site Scripting (XSS) vulnerability in its administrative settings page. The vulnerability exists because the plugin retrieves the `tab` GET parameter using `filter_input(INPUT_GET, 'tab')` without specifying a sanitization filter (defaulting to `FILTER_DEFAULT`, which does not strip HTML tags or attributes) and subsequently echoes this value back into the HTML document without appropriate output escaping (like `esc_attr()` or `esc_html()`).\n\n## 2. Attack Vector Analysis\n- **Target Page**: The plugin's settings page in the WordPress admin dashboard.\n- **Endpoint**: `\u002Fwp-admin\u002Foptions-general.php` or `\u002Fwp-admin\u002Ftools.php` (depending on which menu the plugin registers under).\n- **Vulnerable Parameter**: `tab` (GET parameter).\n- **Authentication Requirement**: The victim must be a logged-in Administrator (or a user with the `manage_options` capability) because the vulnerable code resides in the admin area.\n- **Preconditions**: The attacker must trick the administrator into clicking a malicious link (Reflected XSS).\n\n## 3. Code Flow\n1. **Entry Point**: A user (administrator) navigates to `wp-admin\u002Foptions-general.php?page=website-llms-txt&tab=[PAYLOAD]`.\n2. **Input Retrieval**: In `admin\u002Fadmin-page.php` (or the core class loading it), the plugin likely performs a check like:\n   ```php\n   $active_tab = filter_input(INPUT_GET, 'tab'); \n   ```\n   *Note: In PHP, `filter_input` with two arguments defaults to the raw string if no filter is provided.*\n3. **Vulnerable Sink**: Later in the same file, the `$active_tab` variable is used to construct navigation tabs or hidden inputs without escaping:\n   ```php\n   \u002F\u002F Likely vulnerable pattern (inferred from description)\n   echo '\u003Ca href=\"?page=website-llms-txt&tab=' . $active_tab . '\">Tab Name\u003C\u002Fa>';\n   ```\n4. **Execution**: The browser renders the malicious HTML, executing the payload in the context of the administrator's session.\n\n## 4. Nonce Acquisition Strategy\nReflected XSS vulnerabilities in GET parameters typically **do not require nonces** for the initial reflection to occur, as the `tab` parameter is usually used for UI state rather than state-changing actions. The page itself is accessed via a standard menu link.\n\n- **Nonce Check**: The provided `admin\u002Fadmin-page.php` code shows nonces are checked for `cache_cleared` and `settings-updated` actions, but there is no nonce check required just to render the settings page or process the `tab` parameter.\n- **Bypass**: None needed for reflection.\n\n## 5. Exploitation Strategy\nThe goal is to demonstrate script execution in the admin dashboard.\n\n1. **Identify Admin Slug**: Confirm the exact URL for the settings page. Based on `README.txt`, it is under \"Settings\". The slug is likely `website-llms-txt`.\n2. **Payload Construction**: Use a payload that breaks out of an HTML attribute (most likely an `href` or `class` attribute in a tab list).\n   - Payload: `\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>`\n3. **HTTP Request**:\n   - **Tool**: `http_request` (as an administrator).\n   - **Method**: `GET`\n   - **URL**: `http:\u002F\u002Flocalhost:8080\u002Fwp-admin\u002Foptions-general.php?page=website-llms-txt&tab=%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E`\n4. **Alternative Payload** (if inside a `value` attribute):\n   - Payload: `\" autofocus onfocus=\"alert(1)`\n\n## 6. Test Data Setup\n1. **Install and Activate**: Ensure the \"Website LLMs.txt\" plugin version 8.2.6 is installed and activated.\n2. **User**: Create or use an existing Administrator user account.\n3. **Session**: Log in as the administrator to obtain a valid session cookie for the `http_request` tool.\n\n## 7. Expected Results\n- The HTTP response body will contain the literal string `\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>` inside an HTML attribute or tag, unescaped.\n- When viewed in a browser via the PoC agent, a JavaScript alert dialog showing the site domain will appear.\n\n## 8. Verification Steps\n1. **Source Inspection**: Use the `http_request` tool to fetch the settings page with a unique canary in the `tab` parameter.\n   - Request: `GET \u002Fwp-admin\u002Foptions-general.php?page=website-llms-txt&tab=canary_xss_test`\n   - Verification: Search the response for `canary_xss_test`. Check if it is wrapped in `esc_attr()` (e.g., `value=\"canary_xss_test\"`) or if it's raw.\n2. **Browser Confirmation**: Use `browser_navigate` to the malicious URL and check for the execution of JavaScript (e.g., checking for a global variable set by the script).\n\n## 9. Alternative Approaches\n- **Lesser Privileges**: Check if the page is accessible to \"Editors\" or \"Authors\". If so, the XSS impact remains but the target pool is larger.\n- **Admin Takeover Payload**: If `alert()` works, replace the payload with a script that uses the administrator's `_wpnonce_create-user` (extracted from `\u002Fwp-admin\u002Fuser-new.php`) to create a new administrator account.\n- **Payload Path**: If `options-general.php` returns 404 for that page, try `tools.php?page=llms-file-manager` or `admin.php?page=website-llms-txt`. (The redirect in `includes\u002Fclass-llms-generator.php` to `tools.php` strongly suggests checking the Tools menu).","The Website LLMs.txt plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the 'tab' parameter in versions up to and including 8.2.6. This occurs because the plugin uses filter_input() without a sanitization filter and outputs the resulting value directly into an HTML class attribute without proper escaping.","\u002F\u002F admin\u002Fadmin-page.php\n\n\u003C?php\n    $tab = filter_input(INPUT_GET,'tab');\n?>\n\u003Cdiv class=\"card-column\">\n    \u003Cdiv class=\"card \u003C?php echo $tab; ?>\">","diff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.6\u002Fadmin\u002Fadmin-page.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.7\u002Fadmin\u002Fadmin-page.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.6\u002Fadmin\u002Fadmin-page.php\t2026-02-11 11:25:06.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.7\u002Fadmin\u002Fadmin-page.php\t2026-03-13 18:44:40.000000000 +0000\n@@ -75,7 +75,7 @@\n                     \u003Cdiv id=\"llms-post-types-sortable\" class=\"sortable-list\">\n                         \u003C?php\n                         $post_types = get_post_types(array('public' => true), 'objects');\n-                        $ordered_types = array_flip($settings['post_types']); \u002F\u002F Create lookup array\n+                        $ordered_types = array_flip($settings['post_types'] ?? []); \u002F\u002F Create lookup array\n                         $unordered_types = array(); \u002F\u002F For types not in the current order\n \n                         \u002F\u002F Separate ordered and unordered post types\n@@ -99,7 +99,7 @@\n                                 \u003Cdiv class=\"sortable-item active\" data-post-type=\"\u003C?php echo esc_attr($post_type->name); ?>\">\n                                     \u003Clabel>\n                                         \u003Cinput type=\"checkbox\" name=\"llms_generator_settings[post_types][]\" value=\"\u003C?php echo esc_attr($post_type->name); ?>\" checked>\n-                                        \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_html($post_type->labels->name); ?>]\" value=\"\u003C?php echo $settings['post_name'][esc_html($post_type->labels->name)] ?? ''  ?>\"\u002F>\n+                                        \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_attr($post_type->labels->name); ?>]\" value=\"\u003C?php echo esc_attr($settings['post_name'][$post_type->labels->name] ?? '')  ?>\"\u002F>\n                                         \u003Cspan class=\"dashicons dashicons-menu\">\u003C\u002Fspan>\n                                         \u003C?php echo esc_html($post_type->labels->name); ?>\n                                         \u003Csmall style=\"opacity: 0.7;\">(\u003C?php echo intval($indexed_count) . ' indexed of ' . intval($all_count); ?>)\u003C\u002Fsmall>\n@@ -117,7 +117,7 @@\n                             \u003Cdiv class=\"sortable-item\" data-post-type=\"\u003C?php echo esc_attr($post_type->name); ?>\">\n                                 \u003Clabel>\n                                     \u003Cinput type=\"checkbox\" name=\"llms_generator_settings[post_types][]\" value=\"\u003C?php echo esc_attr($post_type->name); ?>\"\u002F>\n-                                    \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_html($post_type->labels->name); ?>]\" value=\"\u003C?php echo $settings['post_name'][esc_html($post_type->labels->name)] ?? ''  ?>\"\u002F>\n+                                    \u003Cinput type=\"text\" name=\"llms_generator_settings[post_name][\u003C?php echo esc_attr($post_type->labels->name); ?>]\" value=\"\u003C?php echo esc_attr($settings['post_name'][$post_type->labels->name] ?? '')  ?>\"\u002F>\n                                     \u003Cspan class=\"dashicons dashicons-menu\">\u003C\u002Fspan>\n                                     \u003C?php echo esc_html($post_type->labels->name); ?>\n                                     \u003Csmall style=\"opacity: 0.7;\">(\u003C?php echo intval($indexed_count) . ' indexed of ' . intval($all_count); ?>)\u003C\u002Fsmall>\n@@ -197,10 +197,10 @@\n                             \u003C?php if(in_array($key, ['post_types', 'max_posts', 'max_words', 'include_meta', 'include_excerpts', 'detailed_content', 'include_taxonomies', 'gform_include'])) continue ?>\n                             \u003C?php if(is_array($value)):\n                                 foreach($value as $second_key => $second_value):\n-                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>][]\" value=\"\u003C?= $second_value ?>\"\u002F>\n+                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>][]\" value=\"\u003C?= esc_attr($second_value) ?>\"\u002F>\n                                 \u003C?php endforeach\n                             else:\n-                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>]\" value=\"\u003C?= $value ?>\"\u002F>\n+                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>]\" value=\"\u003C?= esc_attr($value) ?>\"\u002F>\n                             \u003C?php endif ?>\n                         \u003C?php endforeach ?>\n                     \u003C?php endif ?>\n@@ -256,10 +256,10 @@\n                             \u003C?php if(in_array($key, ['include_md_file', 'noindex_header', 'llms_allow_indexing', 'update_frequency'])) continue ?>\n                             \u003C?php if(is_array($value)):\n                                 foreach($value as $second_key => $second_value):\n-                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>][]\" value=\"\u003C?= $second_value ?>\"\u002F>\n+                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>][]\" value=\"\u003C?= esc_attr($second_value) ?>\"\u002F>\n                                 \u003C?php endforeach\n                             else:\n-                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>]\" value=\"\u003C?= $value ?>\"\u002F>\n+                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>]\" value=\"\u003C?= esc_attr($value) ?>\"\u002F>\n                             \u003C?php endif ?>\n                         \u003C?php endforeach ?>\n                     \u003C?php endif ?>\n@@ -314,28 +314,28 @@\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt Title', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo (isset($settings['llms_txt_title']) ? $settings['llms_txt_title'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo esc_textarea($settings['llms_txt_title'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Set a custom title for your LLMs.txt file. This will appear at the top of the generated file before any listed URLs.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_txt_description']) ? $settings['llms_txt_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_txt_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Optional introduction text added before the list of URLs. Use this to explain the purpose or structure of your LLMs.txt file.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt After Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_after_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_after_txt_description']) ? $settings['llms_after_txt_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_after_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_after_txt_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Optional text inserted right before the list of links or content entries. You can use it to add additional notes, context, or data usage information before the URLs begin.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt End File Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_end_file_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_end_file_description']) ? $settings['llms_end_file_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_end_file_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_end_file_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Final text appended at the bottom of the LLMs.txt file (e.g. footer, contact, or disclaimer information).', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003C?php if(!empty($settings)):\n@@ -343,10 +343,10 @@\n                             \u003C?php if(in_array($key, ['llms_txt_title', 'llms_txt_description', 'llms_after_txt_description', 'llms_end_file_description'])) continue ?>\n                             \u003C?php if(is_array($value)):\n                                 foreach($value as $second_key => $second_value):\n-                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>][]\" value=\"\u003C?= $second_value ?>\"\u002F>\n+                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>][]\" value=\"\u003C?= esc_attr($second_value) ?>\"\u002F>\n                                 \u003C?php endforeach\n                             else:\n-                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>]\" value=\"\u003C?= $value ?>\"\u002F>\n+                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>]\" value=\"\u003C?= esc_attr($value) ?>\"\u002F>\n                             \u003C?php endif ?>\n                         \u003C?php endforeach ?>\n                     \u003C?php endif ?>\n@@ -354,11 +354,9 @@\n                 \u003C\u002Fform>\n             \u003C\u002Fdiv>\n         \u003C\u002Fdiv>\n-        \u003C?php\n-            $tab = filter_input(INPUT_GET,'tab');\n-        ?>\n+        \u003C?php $tab = sanitize_key(filter_input(INPUT_GET, 'tab')); ?>\n         \u003Cdiv class=\"card-column\">\n-            \u003Cdiv class=\"card \u003C?php echo $tab; ?>\">\n+            \u003Cdiv class=\"card \u003C?php echo esc_attr(sanitize_key($tab)); ?>\">\n                 \u003Cform method=\"post\" action=\"options.php\" id=\"llms-settings-crawler-form\">\n                     \u003C?php settings_fields('llms_generator_settings'); ?>\n                     \u003Ch2>\u003C?php esc_html_e('AI Crawler Detection','website-llms-txt') ?>\u003C\u002Fh2>\n@@ -383,10 +381,10 @@\n                             \u003C?php if(in_array($key, ['llms_local_log_enabled'])) continue ?>\n                             \u003C?php if(is_array($value)):\n                                 foreach($value as $second_key => $second_value):\n-                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>][]\" value=\"\u003C?= $second_value ?>\"\u002F>\n+                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>][]\" value=\"\u003C?= esc_attr($second_value) ?>\"\u002F>\n                                 \u003C?php endforeach\n                             else:\n-                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>]\" value=\"\u003C?= $value ?>\"\u002F>\n+                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>]\" value=\"\u003C?= esc_attr($value) ?>\"\u002F>\n                             \u003C?php endif ?>\n                         \u003C?php endforeach ?>\n                     \u003C?php endif ?>","1. An attacker identifies the plugin's settings page URL, typically `wp-admin\u002Foptions-general.php?page=website-llms-txt` (though sometimes registered under Tools).\n2. The attacker constructs a malicious URL including the `tab` GET parameter containing a script payload, for example: `?page=website-llms-txt&tab=\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>`.\n3. The attacker crafts a delivery mechanism (e.g., a phishing email or a malicious site) to trick an authenticated WordPress Administrator into clicking this link.\n4. When the Administrator visits the link, the plugin retrieves the `tab` value via `filter_input(INPUT_GET, 'tab')` and reflects it into the HTML class attribute of a `div` element without escaping.\n5. The payload executes in the context of the Administrator's session, potentially allowing for session hijacking, unauthorized configuration changes, or the creation of new administrative accounts.","2026-04-27 14:17:09","2026-04-27 14:17:32",{"id":83,"url_slug":84,"title":67,"description":85,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":6,"severity":41,"cvss_score":69,"cvss_vector":70,"vuln_type":44,"published_date":86,"updated_date":87,"references":88,"days_to_patch":90,"patch_diff_files":91,"patch_trac_url":39,"research_status":54,"research_verified":55,"research_rounds_completed":28,"research_plan":92,"research_summary":93,"research_vulnerable_code":94,"research_fix_diff":95,"research_exploit_outline":96,"research_model_used":61,"research_started_at":97,"research_completed_at":98,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":55,"poc_model_used":39,"poc_verification_depth":39},"CVE-2026-27068","website-llmstxt-reflected-cross-site-scripting","The Website LLMs.txt plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 8.2.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.","2026-03-12 00:00:00","2026-03-19 14:57:23",[89],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F618e92af-a669-42d6-9d95-78c3e8e18f11?source=api-prod",8,[50,51,52,53],"\n        $wpdb->prepare(\"SELECT COUNT(*) FROM {$table} WHERE type = %s\", $post_type->name)\n        );\n        ```\n        No, that's a DB query.\n\n        Wait, I've got it. Look at the `README.txt`:\n        \"The plugin includes fallback logic... it serves llms.txt virtually through WordPress rewrite rules\".\n        If the rewrite rules use a parameter that is then reflected.\n        Like `index.php?llms_txt=1&preview=\u003Cscript>`.\n\n        Actually, let's look at `admin\u002Fadmin-page.php` one more time.\n        What if it's the `settings-updated` or `cache_cleared` logic?\n        Wait, I missed something extremely simple.\n        The nonces are checked:\n        ```php\n        if (wp_verify_nonce($nonce, 'llms_cache_cleared')) {\n            echo ...;\n        }\n        ```\n        But what if the `_wpnonce` is reflected *without* validation in an error message?\n        No.\n\n        Let's look at the `admin-page.php` truncated section again.\n        Often, these plugins have a \"Regenerating...\" message that reflects the progress or the current item being processed.\n        `ajax_gen_step` handles the batches.\n\n        Wait! I found a `$_GET` that I missed.\n        Look at `admin\u002Fadmin-page.php","The Website LLMs.txt plugin is vulnerable to Reflected Cross-Site Scripting via the 'tab' query parameter and several settings fields in the admin dashboard. This allows unauthenticated attackers to execute arbitrary JavaScript in the context of a logged-in administrator's browser by tricking them into clicking a specially crafted link.","\u002F\u002F admin\u002Fadmin-page.php:358\n$tab = filter_input(INPUT_GET,'tab');\n?>\n\u003Cdiv class=\"card-column\">\n    \u003Cdiv class=\"card \u003C?php echo $tab; ?>\">\n\n---\n\n\u002F\u002F admin\u002Fadmin-page.php:317\n\u003Cp>\n    \u003Clabel>\n        \u003Cb>\u003C?php esc_html_e('LLMS.txt Title', 'website-llms-txt'); ?>\u003C\u002Fb>\n    \u003C\u002Flabel>\u003Cbr\u002F>\n    \u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo (isset($settings['llms_txt_title']) ? $settings['llms_txt_title'] : '') ?>\u003C\u002Ftextarea>\n    \u003Ci>\u003C?php esc_html_e('Set a custom title for your LLMs.txt file. This will appear at the top of the generated file before any listed URLs.', 'website-llms-txt'); ?>\u003C\u002Fi>\n\u003C\u002Fp>\n\n---\n\n\u002F\u002F admin\u002Fadmin-page.php:200\n\u003C?php if(is_array($value)): ?>\n    \u003C?php foreach($value as $second_key => $second_value): ?>\n        \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>][]\" value=\"\u003C?= $second_value ?>\"\u002F>\n    \u003C?php endforeach ?>\n\u003C?php else: ?>\n    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>]\" value=\"\u003C?= $value ?>\"\u002F>\n\u003C?php endif ?>","diff -ru \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.6\u002Fadmin\u002Fadmin-page.php \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.7\u002Fadmin\u002Fadmin-page.php\n--- \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.6\u002Fadmin\u002Fadmin-page.php\t2026-02-11 11:25:06.000000000 +0000\n+++ \u002Fhome\u002Fdeploy\u002Fwp-safety.org\u002Fdata\u002Fplugin-versions\u002Fwebsite-llms-txt\u002F8.2.7\u002Fadmin\u002Fadmin-page.php\t2026-03-13 18:44:40.000000000 +0000\n@@ -314,28 +314,28 @@\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt Title', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo (isset($settings['llms_txt_title']) ? $settings['llms_txt_title'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_title]\" style=\"width: 100%;height: 40px;\">\u003C?php echo esc_textarea($settings['llms_txt_title'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Set a custom title for your LLMs.txt file. This will appear at the top of the generated file before any listed URLs.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_txt_description']) ? $settings['llms_txt_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_txt_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Optional introduction text added before the list of URLs. Use this to explain the purpose or structure of your LLMs.txt file.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt After Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_after_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_after_txt_description']) ? $settings['llms_after_txt_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_after_txt_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_after_txt_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Optional text inserted right before the list of links or content entries. You can use it to add additional notes, context, or data usage information before the URLs begin.', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003Cp>\n                         \u003Clabel>\n                             \u003Cb>\u003C?php esc_html_e('LLMS.txt End File Description', 'website-llms-txt'); ?>\u003C\u002Fb>\n                         \u003C\u002Flabel>\u003Cbr\u002F>\n-                        \u003Ctextarea name=\"llms_generator_settings[llms_end_file_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo (isset($settings['llms_end_file_description']) ? $settings['llms_end_file_description'] : '') ?>\u003C\u002Ftextarea>\n+                        \u003Ctextarea name=\"llms_generator_settings[llms_end_file_description]\" style=\"width: 100%;height: 80px;\">\u003C?php echo esc_textarea($settings['llms_end_file_description'] ?? '') ?>\u003C\u002Ftextarea>\n                         \u003Ci>\u003C?php esc_html_e('Final text appended at the bottom of the LLMs.txt file (e.g. footer, contact, or disclaimer information).', 'website-llms-txt'); ?>\u003C\u002Fi>\n                     \u003C\u002Fp>\n                     \u003C?php if(!empty($settings)): ?>\n@@ -343,10 +343,10 @@\n                             \u003C?php if(in_array($key, ['llms_txt_title', 'llms_txt_description', 'llms_after_txt_description', 'llms_end_file_description'])) continue ?>\n                             \u003C?php if(is_array($value)): ?>\n                                 \u003C?php foreach($value as $second_key => $second_value): ?>\n-                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>][]\" value=\"\u003C?= $second_value ?>\"\u002F>\n+                                    \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>][]\" value=\"\u003C?= esc_attr($second_value) ?>\"\u002F>\n                                 \u003C?php endforeach ?>\n                             \u003C?php else: ?>\n-                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= $key ?>]\" value=\"\u003C?= $value ?>\"\u002F>\n+                                \u003Cinput type=\"hidden\" name=\"llms_generator_settings[\u003C?= esc_attr($key) ?>]\" value=\"\u003C?= esc_attr($value) ?>\"\u002F>\n                             \u003C?php endif ?>\n                         \u003C?php endforeach ?>\n                     \u003C?php endif ?>\n@@ -354,11 +354,9 @@\n                 \u003C\u002Fform>\n             \u003C\u002Fdiv>\n         \u003C\u002Fdiv>\n-        \u003C?php\n-            $tab = filter_input(INPUT_GET,'tab');\n-        ?>\n+        \u003C?php $tab = sanitize_key(filter_input(INPUT_GET, 'tab')); ?>\n         \u003Cdiv class=\"card-column\">\n-            \u003Cdiv class=\"card \u003C?php echo $tab; ?>\">\n+            \u003Cdiv class=\"card \u003C?php echo esc_attr(sanitize_key($tab)); ?>\">\n                 \u003Cform method=\"post\" action=\"options.php\" id=\"llms-settings-crawler-form\">\n                     \u003C?php settings_fields('llms_generator_settings'); ?>\n                     \u003Ch2>\u003C?php esc_html_e('AI Crawler Detection','website-llms-txt') ?>\u003C\u002Fh2>","The exploit targets the plugin's admin settings page, typically found at `\u002Fwp-admin\u002Foptions-general.php?page=llms-file-manager`. An attacker can append a malicious payload to the 'tab' query parameter (e.g., `&tab=\">\u003Cscript>alert(document.domain)\u003C\u002Fscript>`). When a logged-in administrator visits this URL, the payload breaks out of the HTML class attribute and executes in the victim's browser session. Additionally, the plugin reflected several saved settings and hidden input fields without escaping, which could facilitate Reflected XSS if combined with a form submission that mirrors input or if an attacker can manipulate the options array.","2026-04-18 04:04:43","2026-04-18 04:05:33",{"slug":100,"display_name":7,"profile_url":8,"plugin_count":101,"total_installs":102,"avg_security_score":103,"avg_patch_time_days":28,"trust_score":103,"computed_at":104},"ryhowa",7,30120,99,"2026-05-19T19:36:48.304Z",[106,123,140,159,176],{"slug":107,"name":108,"version":109,"author":110,"author_profile":111,"description":112,"short_description":113,"active_installs":114,"downloaded":115,"rating":29,"num_ratings":29,"last_updated":116,"tested_up_to":16,"requires_at_least":117,"requires_php":118,"tags":119,"homepage":120,"download_link":121,"security_score":122,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"llms-txt-sitemap-manager","LLMs.txt Sitemap Manager","1.0.4","Sandalia Apps","https:\u002F\u002Fprofiles.wordpress.org\u002Fsandaliaapps\u002F","\u003Cp>LLMs.txt Sitemap Manager automatically generates an \u003Cstrong>LLMs.txt file\u003C\u002Fstrong> — a structured, lightweight list of important public URLs from your site — specifically designed for \u003Cstrong>Large Language Models (LLMs)\u003C\u002Fstrong> like ChatGPT, Perplexity, Claude, and other AI systems.\u003C\u002Fp>\n\u003Cp>Think of it as a traditional XML sitemap but optimized for AI agents to read, understand, and learn from your website content.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Key Benefits:\u003C\u002Fstrong>\u003Cbr \u002F>\n– ✅ Future-proof your site for AI discovery\u003Cbr \u002F>\n– ✅ Lightweight, automatic, and customizable\u003Cbr \u002F>\n– ✅ No manual configuration needed\u003C\u002Fp>\n\u003Cp>\u003Cstrong>New:\u003C\u002Fstrong> AI Crawler Detection\u003Cbr \u002F>\nTrack whether major AI bots like GPTBot, ClaudeBot, and PerplexityBot are reading your \u003Cstrong>LLMs.txt\u003C\u002Fstrong> files.\u003C\u002Fp>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Automatic LLMs.txt generation  \u003C\u002Fli>\n\u003Cli>Custom post type selection and ordering  \u003C\u002Fli>\n\u003Cli>Integration with popular SEO plugins (Yoast SEO, Rank Math, AIOSEO)  \u003C\u002Fli>\n\u003Cli>Sitemap integration for improved discoverability  \u003C\u002Fli>\n\u003Cli>Cache management for performance  \u003C\u002Fli>\n\u003Cli>Configurable update frequency  \u003C\u002Fli>\n\u003Cli>AI crawler detection to monitor bot activity  \u003C\u002Fli>\n\u003Cli>FAQ section for quick guidance\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Custom Development & Feature Requests\u003C\u002Fh3>\n\u003Cp>Need a custom feature or want to enhance Project Manager to fit your workflow?\u003Cbr \u002F>\nI provide custom WordPress plugin development, feature requests, and tailored solutions to make your project management seamless.\u003C\u002Fp>\n\u003Ch4>Contact for Custom Development\u003C\u002Fh4>\n\u003Cp>🌐 Website: \u003Ca href=\"https:\u002F\u002Fsandalia.com.bd\u002Fapps\" rel=\"nofollow ugc\">https:\u002F\u002Fsandalia.com.bd\u002Fapps\u003C\u002Fa>\u003Cbr \u002F>\n💼 Upwork (Delower): \u003Ca href=\"https:\u002F\u002Fwww.upwork.com\u002Ffreelancers\u002Fdelower\" rel=\"nofollow ugc\">https:\u002F\u002Fwww.upwork.com\u002Ffreelancers\u002Fdelower\u003C\u002Fa>\u003Cbr \u002F>\n💼 Linkedin (Delower): \u003Ca href=\"https:\u002F\u002Fwww.linkedin.com\u002Fin\u002Fdelower186\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwww.linkedin.com\u002Fin\u002Fdelower186\u002F\u003C\u002Fa>\u003Cbr \u002F>\n💼 Linkedin (Sandalia): \u003Ca href=\"https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fsandalia-apps\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fsandalia-apps\u002F\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Do You need any Data Scraping Services? Try\u003C\u002Fh4>\n\u003Cp>🌐 Marketplace: \u003Ca href=\"https:\u002F\u002Fapify.com\u002Fsandaliaapps\" rel=\"nofollow ugc\">https:\u002F\u002Fapify.com\u002Fsandaliaapps\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Try My Other Plugins\u003C\u002Fh3>\n\u003Ch4>WP TO Do\u003C\u002Fh4>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-todo\u002F\" rel=\"ugc\">WP TO Do\u003C\u002Fa> is a powerful WordPress plugin that allows you to create, manage, and track tasks effortlessly. It’s perfect for individuals, teams, and businesses looking to stay organized and boost productivity.\u003C\u002Fp>\n\u003Ch4>Project Manager Pro\u003C\u002Fh4>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fproject-manager-pro\u002F\" rel=\"ugc\">Project Manager Pro\u003C\u002Fa> is a lightweight and easy-to-use plugin that allows you to create, manage, and track projects and tasks directly within WordPress.\u003C\u002Fp>\n\u003Ch3>Additional Notes\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Lightweight and fully automatic  \u003C\u002Fli>\n\u003Cli>Works out-of-the-box with minimal setup  \u003C\u002Fli>\n\u003Cli>Helps your site be AI-ready without extra effort\u003C\u002Fli>\n\u003C\u002Ful>\n","Automatically generate and manage LLMs.txt files for AI discovery",10,318,"2025-10-03T07:50:00.000Z","6.4","7.2.24",[20,21,22,23,24],"https:\u002F\u002Fsandalia.com.bd\u002Fapps\u002Fview_project.php?slug=llms-txt-sitemap-manager","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fllms-txt-sitemap-manager.1.0.4.zip",100,{"slug":124,"name":125,"version":126,"author":127,"author_profile":128,"description":129,"short_description":130,"active_installs":29,"downloaded":131,"rating":29,"num_ratings":29,"last_updated":132,"tested_up_to":133,"requires_at_least":17,"requires_php":134,"tags":135,"homepage":137,"download_link":138,"security_score":122,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":139},"wpgeared-llms-txt-generator","WPGeared LLMs.txt Generator","1.2.7","Aamir Faiz","https:\u002F\u002Fprofiles.wordpress.org\u002Faamirfaiz\u002F","\u003Cp>WPGeared LLMs.txt Generator creates and manages an \u003Ccode>llms.txt\u003C\u002Fcode> file, helping AI models like ChatGPT and Claude better understand your site’s content.\u003C\u002Fp>\n\u003Ch4>Key Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Automatic Generation\u003C\u002Fstrong>: Dynamically creates and updates the \u003Ccode>\u002Fllms.txt\u003C\u002Fcode> file as your content changes\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SEO Plugin Integration\u003C\u002Fstrong>: Seamlessly integrates with Yoast SEO, Rank Math, All in One SEO, and SEOPress to respect noindex\u002Fnofollow directives\u003C\u002Fli>\n\u003Cli>\u003Cstrong>AI Crawler Detection\u003C\u002Fstrong>: Monitors and logs visits from AI bots (GPTBot, ClaudeBot, PerplexityBot, etc.)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Customizable Content\u003C\u002Fstrong>: Choose which post types, categories, and tags to include\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Caching System\u003C\u002Fstrong>: Built-in caching for optimal performance\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User-Friendly Interface\u003C\u002Fstrong>: Intuitive settings page in WordPress admin\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security First\u003C\u002Fstrong>: Follows WordPress security best practices\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>How It Works\u003C\u002Fh4>\n\u003Cp>The plugin automatically generates an \u003Ccode>llms.txt\u003C\u002Fcode> file at your site’s root (e.g., \u003Ccode>https:\u002F\u002Fyoursite.com\u002Fllms.txt\u003C\u002Fcode>) that includes:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Site description\u003C\u002Fli>\n\u003Cli>Main navigation links\u003C\u002Fli>\n\u003Cli>Important pages\u003C\u002Fli>\n\u003Cli>Categories and tags\u003C\u002Fli>\n\u003Cli>Recent posts\u003C\u002Fli>\n\u003Cli>Sitemap links\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>The file is automatically updated whenever you publish, update, or delete content.\u003C\u002Fp>\n\u003Ch4>SEO Integration\u003C\u002Fh4>\n\u003Cp>The plugin automatically detects and integrates with popular SEO plugins:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Yoast SEO\u003C\u002Fli>\n\u003Cli>Rank Math\u003C\u002Fli>\n\u003Cli>All in One SEO (AIOSEO)\u003C\u002Fli>\n\u003Cli>SEOPress\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Content marked as “noindex” in these plugins will be automatically excluded from the LLMs.txt file.\u003C\u002Fp>\n\u003Ch4>AI Crawler Detection\u003C\u002Fh4>\n\u003Cp>Track visits from AI crawlers including:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>GPTBot (OpenAI)\u003C\u002Fli>\n\u003Cli>ClaudeBot (Anthropic)\u003C\u002Fli>\n\u003Cli>PerplexityBot\u003C\u002Fli>\n\u003Cli>Google-Extended\u003C\u002Fli>\n\u003Cli>CCBot (Common Crawl)\u003C\u002Fli>\n\u003Cli>And more…\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>View statistics and recent visits in the admin dashboard.\u003C\u002Fp>\n","Auto-generate llms.txt to help AI models like ChatGPT, Claude, Perplexity & Gemini discover and understand your site content.",145,"2025-12-21T19:28:00.000Z","6.9.4","7.4",[20,136,22,23,24],"llms-txt","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwpgeared-llms-txt-generator\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwpgeared-llms-txt-generator.1.2.7.zip","2026-03-15T15:16:48.613Z",{"slug":141,"name":142,"version":143,"author":144,"author_profile":145,"description":146,"short_description":147,"active_installs":148,"downloaded":149,"rating":150,"num_ratings":90,"last_updated":151,"tested_up_to":16,"requires_at_least":152,"requires_php":153,"tags":154,"homepage":25,"download_link":158,"security_score":122,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"llms-full-txt-generator","LLMs.txt and LLMs-Full.txt Generator","2.0.7","rankth","https:\u002F\u002Fprofiles.wordpress.org\u002Frankth\u002F","\u003Cp>The LLMS Full TXT Generator is a WordPress plugin designed to automatically generate \u003Ccode>llms.txt\u003C\u002Fcode> and \u003Ccode>llms-full.txt\u003C\u002Fcode> files in the root directory of your website.\u003C\u002Fp>\n\u003Cp>These files provide a structured list of your pages and posts, useful for:\u003Cbr \u002F>\n– content indexing\u003Cbr \u002F>\n– AI training\u003Cbr \u002F>\n– enhancing AI systems’ interaction with your site\u003C\u002Fp>\n\u003Cp>Using these files helps optimize your website for AI discovery—similar to how \u003Ccode>robots.txt\u003C\u002Fcode> guides search engines.\u003C\u002Fp>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Customizable Post Types:\u003C\u002Fstrong> Select which post types to include in the generated files\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enhanced Media Support:\u003C\u002Fstrong> Full WordPress media library integration through attachment post type:\n\u003Cul>\n\u003Cli>Detailed media information including titles, URLs, alt text, captions, and descriptions\u003C\u002Fli>\n\u003Cli>Structured media documentation in Markdown format\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Post Excerpts:\u003C\u002Fstrong> Option to include post excerpts for more detailed content representation\u003C\u002Fli>\n\u003Cli>\u003Cstrong>URL Management:\u003C\u002Fstrong> Include or exclude specific URLs or URL patterns using wildcards\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Easy Regeneration:\u003C\u002Fstrong> Regenerate files easily when content changes to keep them up-to-date\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enhanced SEO Integration:\u003C\u002Fstrong> Fully compatible with all major SEO plugins, including:\n\u003Cul>\n\u003Cli>Yoast SEO\u003C\u002Fli>\n\u003Cli>Rank Math\u003C\u002Fli>\n\u003Cli>SEOPress\u003C\u002Fli>\n\u003Cli>All-in-One SEO\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Smart URL Pattern Matching:\u003C\u002Fstrong> Advanced path matching for better content organisation\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Robots.txt Support:\u003C\u002Fstrong> Respects your robots.txt configuration and noindex settings\u003C\u002Fli>\n\u003Cli>\u003Cstrong>UTF-8 Support:\u003C\u002Fstrong> Proper handling of special characters with UTF-8 BOM\u003C\u002Fli>\n\u003C\u002Ful>\n","Generate llms.txt and llms-full.txt files for WordPress to guide AI and LLMs. Fully compatible with Yoast SEO, Rank Math, SEOPress, and All in One SEO &hellip;",3000,27450,90,"2026-03-13T06:33:00.000Z","5.0","7.0",[155,156,22,23,157],"ai-llm","llms","txt-generator","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fllms-full-txt-generator.zip",{"slug":160,"name":161,"version":162,"author":163,"author_profile":164,"description":165,"short_description":166,"active_installs":167,"downloaded":168,"rating":29,"num_ratings":29,"last_updated":169,"tested_up_to":133,"requires_at_least":170,"requires_php":171,"tags":172,"homepage":25,"download_link":175,"security_score":122,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"ada-seo-by-adaptify","SEO One-Click Publishing","1.5.8","hansjan","https:\u002F\u002Fprofiles.wordpress.org\u002Fhansjan\u002F","\u003Cp>A one-click SEO publishing plugin designed to streamline content optimization and publishing. It ensures SEO best practices are seamlessly integrated.\u003C\u002Fp>\n","A one-click SEO publishing plugin designed to streamline content optimization and publishing. It ensures SEO best practices are seamlessly integrated.",500,9484,"2026-02-24T14:14:00.000Z","4.4","5.6",[173,174,22,23,24],"aioseo","keywords","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fada-seo-by-adaptify.1.5.8.zip",{"slug":177,"name":178,"version":179,"author":180,"author_profile":181,"description":182,"short_description":183,"active_installs":184,"downloaded":185,"rating":29,"num_ratings":29,"last_updated":186,"tested_up_to":133,"requires_at_least":152,"requires_php":25,"tags":187,"homepage":189,"download_link":190,"security_score":122,"vuln_count":29,"unpatched_count":29,"last_vuln_date":39,"fetched_at":31},"pempo-ai-discovery","PEMPO AI Discovery – Boost LLM Traffic from ChatGPT, Google AI Overviews & More","1.0.3","Josh J","https:\u002F\u002Fprofiles.wordpress.org\u002Fjoshjaffe\u002F","\u003Cp>PEMPO turns your existing WordPress content into AI‑ready sources that get pulled into answers. It helps ChatGPT, Google AI Overviews, Perplexity and Claude find, understand and cite your posts—so you earn traffic from AI search, not just blue links.\u003C\u002Fp>\n\u003Cp>This is \u003Cstrong>SEO for AI\u003C\u002Fstrong>, not \u003Cstrong>AI for SEO\u003C\u002Fstrong>. We don’t generate copy or spin titles. Instead, PEMPO structures your content so large language models can parse facts, FAQs, claims and attribution—complete with citations you control.\u003C\u002Fp>\n\u003Cp>Install and go. PEMPO automatically injects standards‑compliant JSON‑LD, semantic text chunks and verification data, and cleans distracting widgets. It works alongside Yoast, Rank Math and AIOSEO without changing your theme or workflow.\u003C\u002Fp>\n\u003Cp>The PEMPO Dashboard shows you exactly how AI sees your site—grading both individual posts and your entire domain. See detailed counts of the elements LLMs value most: FAQs, citations, semantic chunks, and named entities. Instantly spot weak spots, fix them, and watch your grades climb to A.\u003C\u002Fp>\n\u003Ch3>Key Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Instant AI optimization for all your content — no setup needed\u003C\u002Fli>\n\u003Cli>Automatic JSON-LD schema injection for facts, FAQs, and claims\u003C\u002Fli>\n\u003Cli>Citation customization with publication name, style, and credibility\u003C\u002Fli>\n\u003Cli>Content filtering removes promotional clutter for clearer AI parsing\u003C\u002Fli>\n\u003Cli>Semantic chunking to help AI pinpoint key information\u003C\u002Fli>\n\u003Cli>Live AI Readiness Dashboard with detailed grading and actionable insights\u003C\u002Fli>\n\u003Cli>Compatible with any theme and popular SEO plugins like Yoast & RankMath\u003C\u002Fli>\n\u003Cli>Lightweight and fast with zero external requests\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>How It Works for You\u003C\u002Fh3>\n\u003Cp>PEMPO works silently in the background, embedding rich metadata that AI models instantly understand. When ChatGPT or Google AI Overviews crawl your posts, they see exactly who authored the content, when it was published, and the key points you want highlighted. This increases your chances of being cited accurately and prominently in AI-generated answers.\u003C\u002Fp>\n\u003Ch3>Technical Specs\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Uses Schema.org JSON-LD for structured data markup\u003C\u002Fli>\n\u003Cli>No external API calls or performance impact\u003C\u002Fli>\n\u003Cli>Semantic text chunking for precise AI citations  \u003C\u002Fli>\n\u003Cli>Author and publication credibility signals\u003C\u002Fli>\n\u003Cli>Fact-checking metadata to boost source trustworthiness\u003C\u002Fli>\n\u003Cli>Fully compatible with existing SEO tools and workflows\u003C\u002Fli>\n\u003C\u002Ful>\n","Get traffic from AI search – Automatically add rich schema to optimize content for ChatGPT, Google AI Overviews & more.",20,442,"2025-08-13T03:31:00.000Z",[20,21,188,23,24],"schema","https:\u002F\u002Fpempo.ai","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fpempo-ai-discovery.1.0.3.zip",{"attackSurface":192,"codeSignals":414,"taintFlows":452,"riskAssessment":453,"analyzedAt":456},{"hooks":193,"ajaxHandlers":376,"restRoutes":399,"shortcodes":400,"cronEvents":401,"entryPointCount":413,"unprotectedCount":29},[194,200,204,209,213,217,221,225,229,233,237,240,244,247,251,253,256,259,262,266,270,273,274,278,282,287,291,294,297,300,303,307,311,314,317,320,323,326,328,331,334,338,341,343,345,347,351,354,357,360,363,366,368,369,371,374],{"type":195,"name":196,"callback":197,"file":198,"line":199},"action","llms_clear_seo_caches","clear_all_caches","includes\\class-llms-cache-manager.php",18,{"type":195,"name":201,"callback":202,"file":198,"line":203},"plugins_loaded","setup_cache_exclusions",21,{"type":205,"name":206,"callback":207,"priority":114,"file":198,"line":208},"filter","autoptimize_filter_noptimize","exclude_autoptimize",30,{"type":205,"name":210,"callback":211,"file":198,"line":212},"rocket_cache_reject_uri","exclude_wp_rocket",35,{"type":205,"name":214,"callback":215,"file":198,"line":216},"w3tc_pagecache_reject_uri","exclude_w3_total_cache",40,{"type":205,"name":218,"callback":219,"file":198,"line":220},"wp_cache_reject_uri","exclude_wp_super_cache",45,{"type":205,"name":222,"callback":223,"file":198,"line":224},"litespeed_cache_exclude_path","exclude_litespeed",50,{"type":195,"name":226,"callback":226,"priority":29,"file":227,"line":228},"init","includes\\class-llms-core.php",16,{"type":195,"name":230,"callback":231,"file":227,"line":232},"admin_menu","add_admin_menu",19,{"type":195,"name":234,"callback":235,"file":227,"line":236},"admin_post_clear_caches","handle_cache_clearing",23,{"type":195,"name":226,"callback":238,"file":227,"line":239},"init_seo_integrations",26,{"type":195,"name":241,"callback":242,"file":227,"line":243},"admin_init","register_settings",29,{"type":195,"name":245,"callback":246,"file":227,"line":208},"admin_notices","llms_ai_banner_dismissed",{"type":195,"name":248,"callback":249,"file":227,"line":250},"admin_enqueue_scripts","enqueue_admin_scripts",33,{"type":195,"name":252,"callback":252,"file":227,"line":212},"wp_head",{"type":195,"name":254,"callback":254,"file":227,"line":255},"all_admin_notices",37,{"type":195,"name":248,"callback":257,"file":227,"line":258},"enqueue_notice_script",38,{"type":205,"name":260,"callback":260,"priority":114,"file":227,"line":261},"redirect_canonical",41,{"type":205,"name":263,"callback":264,"file":227,"line":265},"query_vars","add_query_vars",121,{"type":195,"name":267,"callback":268,"file":227,"line":269},"template_redirect","handle_llms_request",122,{"type":195,"name":241,"callback":271,"file":272,"line":14},"closure","includes\\class-llms-crawler.php",{"type":195,"name":226,"callback":226,"file":272,"line":203},{"type":195,"name":226,"callback":275,"priority":184,"file":276,"line":277},"init_generator","includes\\class-llms-generator.php",57,{"type":195,"name":279,"callback":280,"priority":114,"file":276,"line":281},"save_post","handle_post_update",65,{"type":195,"name":283,"callback":284,"priority":285,"file":276,"line":286},"deleted_post","handle_post_deletion",999,66,{"type":195,"name":288,"callback":289,"file":276,"line":290},"wp_update_term","handle_term_update",67,{"type":195,"name":292,"callback":292,"file":276,"line":293},"llms_scheduled_update",68,{"type":195,"name":295,"callback":295,"file":276,"line":296},"schedule_updates",69,{"type":205,"name":298,"callback":298,"file":276,"line":299},"get_llms_content",70,{"type":195,"name":226,"callback":301,"file":276,"line":302},"llms_maybe_create_ai_sitemap_page",71,{"type":195,"name":304,"callback":305,"file":276,"line":306},"llms_update_llms_file_cron","update_llms_file",72,{"type":195,"name":308,"callback":309,"file":276,"line":310},"admin_post_run_manual_update_llms_file","run_manual_update_llms_file",73,{"type":195,"name":226,"callback":312,"priority":285,"file":276,"line":313},"llms_create_txt_cache_table_if_not_exists",74,{"type":195,"name":315,"callback":315,"priority":285,"file":276,"line":316},"updates_all_posts",75,{"type":205,"name":318,"callback":318,"file":276,"line":319},"get_llms_generator_settings",76,{"type":195,"name":321,"callback":321,"file":276,"line":322},"single_llms_generator_hook",77,{"type":195,"name":324,"callback":324,"file":325,"line":14},"add_meta_boxes","includes\\class-llms-md.php",{"type":195,"name":279,"callback":279,"file":325,"line":327},12,{"type":195,"name":329,"callback":329,"file":325,"line":330},"post_edit_form_tag",13,{"type":205,"name":332,"callback":332,"file":325,"line":333},"upload_mimes",14,{"type":205,"name":335,"callback":336,"file":325,"line":337},"upload_dir","llms_md_upload_dir",140,{"type":205,"name":339,"callback":271,"file":340,"line":327},"rank_math\u002Fsitemap\u002Fproviders","includes\\rank-math.php",{"type":195,"name":342,"callback":271,"file":340,"line":184},"llms_clear_seo_caches_rank_math",{"type":195,"name":196,"callback":271,"file":340,"line":344},32,{"type":205,"name":346,"callback":271,"priority":184,"file":340,"line":220},"rank_math\u002Fsitemap\u002Fexclude_post_type",{"type":205,"name":348,"callback":349,"priority":114,"file":340,"line":350},"llms_generator_get_post_meta_description","llm_rank_math_compatibility_get_post_meta_description",52,{"type":205,"name":352,"callback":353,"priority":114,"file":340,"line":302},"llms_generator_get_site_meta_description","llm_rank_math_get_site_meta_description",{"type":195,"name":226,"callback":355,"priority":48,"file":356,"line":90},"add_rewrite_rules","includes\\yoast.php",{"type":195,"name":226,"callback":358,"priority":285,"file":356,"line":359},"maybe_generate_sitemap",9,{"type":205,"name":361,"callback":362,"file":356,"line":114},"wpseo_sitemap_index","add_to_index",{"type":205,"name":364,"callback":365,"file":356,"line":14},"wpseo_sitemap_llms_content","generate_sitemap",{"type":195,"name":196,"callback":367,"file":356,"line":327},"clear_sitemap_cache",{"type":205,"name":263,"callback":263,"file":356,"line":330},{"type":205,"name":348,"callback":370,"priority":114,"file":356,"line":333},"get_post_meta_description",{"type":205,"name":352,"callback":372,"priority":114,"file":356,"line":373},"get_site_meta_description",15,{"type":195,"name":201,"callback":375,"file":53,"line":261},"llms_init",[377,381,383,387,391,395],{"action":378,"nopriv":55,"callback":378,"hasNonce":379,"hasCapCheck":55,"file":227,"line":380},"dismiss_llms_admin_notice",true,39,{"action":382,"nopriv":55,"callback":382,"hasNonce":379,"hasCapCheck":55,"file":227,"line":216},"dismiss_llms_ai_banner_dismissed",{"action":384,"nopriv":55,"callback":385,"hasNonce":379,"hasCapCheck":379,"file":276,"line":386},"run_llms_txt_reset_file","ajax_reset_gen_init",59,{"action":388,"nopriv":55,"callback":389,"hasNonce":379,"hasCapCheck":379,"file":276,"line":390},"llms_gen_init","ajax_gen_init",60,{"action":392,"nopriv":55,"callback":393,"hasNonce":379,"hasCapCheck":379,"file":276,"line":394},"llms_gen_step","ajax_gen_step",61,{"action":396,"nopriv":55,"callback":397,"hasNonce":379,"hasCapCheck":379,"file":276,"line":398},"llms_update_file","ajax_update_file",62,[],[],[402,403,405,407,409,411],{"hook":304,"callback":304,"file":227,"line":115},{"hook":304,"callback":304,"file":276,"line":404},233,{"hook":304,"callback":304,"file":276,"line":406},1060,{"hook":304,"callback":304,"file":276,"line":408},1080,{"hook":304,"callback":304,"file":276,"line":410},1088,{"hook":292,"callback":292,"file":276,"line":412},1184,6,{"dangerousFunctions":415,"sqlUsage":416,"outputEscaping":433,"fileOperations":413,"externalRequests":450,"nonceChecks":14,"capabilityChecks":413,"bundledLibraries":451},[],{"prepared":203,"raw":413,"locations":417},[418,421,423,425,428,430],{"file":227,"line":419,"context":420},245,"$wpdb->query() with variable interpolation",{"file":227,"line":422,"context":420},315,{"file":276,"line":424,"context":420},731,{"file":276,"line":426,"context":427},880,"$wpdb->get_var() with variable interpolation",{"file":276,"line":429,"context":427},977,{"file":276,"line":431,"context":432},979,"$wpdb->get_row() with variable interpolation",{"escaped":434,"rawEcho":101,"locations":435},136,[436,440,441,443,445,447,449],{"file":437,"line":438,"context":439},"admin\\admin-page.php",17,"raw output",{"file":437,"line":239,"context":439},{"file":227,"line":442,"context":439},64,{"file":276,"line":444,"context":439},995,{"file":325,"line":446,"context":439},86,{"file":356,"line":448,"context":439},54,{"file":356,"line":27,"context":439},4,[],[],{"summary":454,"deductions":455},"The plugin \"website-llms-txt\" v8.2.7 exhibits a generally strong security posture, with excellent adherence to best practices in several key areas.  The absence of any recorded vulnerabilities in its history is a significant positive indicator.  Furthermore, the code analysis reveals robust security measures like a high percentage of prepared statements for SQL queries and a commendable rate of output escaping, minimizing common attack vectors.  The presence of nonce and capability checks on all identified AJAX handlers also suggests a conscious effort to protect against unauthorized actions.\n\nHowever, a detailed examination of the static analysis results reveals a few areas that, while not immediately critical, warrant careful consideration.  The existence of 6 AJAX handlers, even though they are protected with authentication checks, represents a potential attack surface. While the analysis indicates these are secured, any complexity or unintended logic within these handlers could introduce subtle vulnerabilities.  The file operations and external HTTP requests, while not flagged as problematic in the taint analysis, are also entry points that require ongoing vigilance.  The lack of any taint analysis flows analyzed is a neutral observation; it doesn't indicate a problem but also doesn't provide assurance against highly complex, chained vulnerabilities.\n\nIn conclusion, \"website-llms-txt\" v8.2.7 appears to be a well-secured plugin, with a strong foundation in secure coding practices and a clean vulnerability history. The developers have implemented good defenses against common threats.  The primary areas for continued attention are the maintenance of security on the existing AJAX handlers and the potential for future issues if the plugin's functionality expands into more complex data interactions or external integrations.",[],"2026-03-16T17:23:59.167Z",{"wat":458,"direct":465},{"assetPaths":459,"generatorPatterns":461,"scriptPaths":462,"versionParams":463},[460],"\u002Fwp-content\u002Fplugins\u002Fwebsite-llms-txt\u002Fadmin\u002Fnotice-dismiss.js",[],[460],[464],"website-llms-txt\u002Fadmin\u002Fnotice-dismiss.js?ver=",{"cssClasses":466,"htmlComments":469,"htmlAttributes":470,"restEndpoints":471,"jsGlobals":472,"shortcodeOutput":474},[467,468],"llms-ai-banner","llms-admin-notice",[],[],[],[473],"llmsNoticeAjax",[],{"error":379,"url":476,"statusCode":477,"statusMessage":478,"message":478},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fwebsite-llms-txt\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":480,"versions":481},78,[482,487,497,507,517,527,537,547,557,567,577,587,597,607,617,627,637,647,657,667,677,687,697,707,717,727,737,747,757,767,777,787,797,807,817,827,837,847,857,867,877,887,897,907,917,927,937,947,957,967,977,987,997,1007,1017,1027,1037,1047,1057,1067,1077,1087,1097,1107,1117,1127,1137,1147,1157,1167,1177,1187,1197,1207,1217,1227,1237,1247],{"version":6,"download_url":26,"svn_tag_url":483,"released_at":39,"has_diff":55,"diff_files_changed":484,"diff_lines":39,"trac_diff_url":485,"vulnerabilities":486,"is_current":379},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.7",[],{"version":488,"download_url":489,"svn_tag_url":490,"released_at":39,"has_diff":55,"diff_files_changed":491,"diff_lines":39,"trac_diff_url":492,"vulnerabilities":493,"is_current":55},"8.2.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.6",[494,495,496],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":498,"download_url":499,"svn_tag_url":500,"released_at":39,"has_diff":55,"diff_files_changed":501,"diff_lines":39,"trac_diff_url":502,"vulnerabilities":503,"is_current":55},"8.2.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.5",[504,505,506],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":508,"download_url":509,"svn_tag_url":510,"released_at":39,"has_diff":55,"diff_files_changed":511,"diff_lines":39,"trac_diff_url":512,"vulnerabilities":513,"is_current":55},"8.2.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.3&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.4",[514,515,516],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":518,"download_url":519,"svn_tag_url":520,"released_at":39,"has_diff":55,"diff_files_changed":521,"diff_lines":39,"trac_diff_url":522,"vulnerabilities":523,"is_current":55},"8.2.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.3",[524,525,526],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":528,"download_url":529,"svn_tag_url":530,"released_at":39,"has_diff":55,"diff_files_changed":531,"diff_lines":39,"trac_diff_url":532,"vulnerabilities":533,"is_current":55},"8.2.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.2",[534,535,536],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":538,"download_url":539,"svn_tag_url":540,"released_at":39,"has_diff":55,"diff_files_changed":541,"diff_lines":39,"trac_diff_url":542,"vulnerabilities":543,"is_current":55},"8.2.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.1",[544,545,546],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":548,"download_url":549,"svn_tag_url":550,"released_at":39,"has_diff":55,"diff_files_changed":551,"diff_lines":39,"trac_diff_url":552,"vulnerabilities":553,"is_current":55},"8.2.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.2.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.2.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.9&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.2.0",[554,555,556],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":558,"download_url":559,"svn_tag_url":560,"released_at":39,"has_diff":55,"diff_files_changed":561,"diff_lines":39,"trac_diff_url":562,"vulnerabilities":563,"is_current":55},"8.1.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.8&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.9",[564,565,566],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":568,"download_url":569,"svn_tag_url":570,"released_at":39,"has_diff":55,"diff_files_changed":571,"diff_lines":39,"trac_diff_url":572,"vulnerabilities":573,"is_current":55},"8.1.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.7&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.8",[574,575,576],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":578,"download_url":579,"svn_tag_url":580,"released_at":39,"has_diff":55,"diff_files_changed":581,"diff_lines":39,"trac_diff_url":582,"vulnerabilities":583,"is_current":55},"8.1.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.7",[584,585,586],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":588,"download_url":589,"svn_tag_url":590,"released_at":39,"has_diff":55,"diff_files_changed":591,"diff_lines":39,"trac_diff_url":592,"vulnerabilities":593,"is_current":55},"8.1.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.6",[594,595,596],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":598,"download_url":599,"svn_tag_url":600,"released_at":39,"has_diff":55,"diff_files_changed":601,"diff_lines":39,"trac_diff_url":602,"vulnerabilities":603,"is_current":55},"8.1.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.5",[604,605,606],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":608,"download_url":609,"svn_tag_url":610,"released_at":39,"has_diff":55,"diff_files_changed":611,"diff_lines":39,"trac_diff_url":612,"vulnerabilities":613,"is_current":55},"8.1.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.3&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.4",[614,615,616],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":618,"download_url":619,"svn_tag_url":620,"released_at":39,"has_diff":55,"diff_files_changed":621,"diff_lines":39,"trac_diff_url":622,"vulnerabilities":623,"is_current":55},"8.1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.3",[624,625,626],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":628,"download_url":629,"svn_tag_url":630,"released_at":39,"has_diff":55,"diff_files_changed":631,"diff_lines":39,"trac_diff_url":632,"vulnerabilities":633,"is_current":55},"8.1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.2",[634,635,636],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":638,"download_url":639,"svn_tag_url":640,"released_at":39,"has_diff":55,"diff_files_changed":641,"diff_lines":39,"trac_diff_url":642,"vulnerabilities":643,"is_current":55},"8.1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.1",[644,645,646],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":648,"download_url":649,"svn_tag_url":650,"released_at":39,"has_diff":55,"diff_files_changed":651,"diff_lines":39,"trac_diff_url":652,"vulnerabilities":653,"is_current":55},"8.1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.1.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.9&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.1.0",[654,655,656],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":658,"download_url":659,"svn_tag_url":660,"released_at":39,"has_diff":55,"diff_files_changed":661,"diff_lines":39,"trac_diff_url":662,"vulnerabilities":663,"is_current":55},"8.0.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.8&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.9",[664,665,666],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":668,"download_url":669,"svn_tag_url":670,"released_at":39,"has_diff":55,"diff_files_changed":671,"diff_lines":39,"trac_diff_url":672,"vulnerabilities":673,"is_current":55},"8.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.7&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.8",[674,675,676],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":678,"download_url":679,"svn_tag_url":680,"released_at":39,"has_diff":55,"diff_files_changed":681,"diff_lines":39,"trac_diff_url":682,"vulnerabilities":683,"is_current":55},"8.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.7",[684,685,686],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":688,"download_url":689,"svn_tag_url":690,"released_at":39,"has_diff":55,"diff_files_changed":691,"diff_lines":39,"trac_diff_url":692,"vulnerabilities":693,"is_current":55},"8.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.6",[694,695,696],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":698,"download_url":699,"svn_tag_url":700,"released_at":39,"has_diff":55,"diff_files_changed":701,"diff_lines":39,"trac_diff_url":702,"vulnerabilities":703,"is_current":55},"8.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.5",[704,705,706],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":708,"download_url":709,"svn_tag_url":710,"released_at":39,"has_diff":55,"diff_files_changed":711,"diff_lines":39,"trac_diff_url":712,"vulnerabilities":713,"is_current":55},"8.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.3&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.4",[714,715,716],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":718,"download_url":719,"svn_tag_url":720,"released_at":39,"has_diff":55,"diff_files_changed":721,"diff_lines":39,"trac_diff_url":722,"vulnerabilities":723,"is_current":55},"8.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.3",[724,725,726],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":728,"download_url":729,"svn_tag_url":730,"released_at":39,"has_diff":55,"diff_files_changed":731,"diff_lines":39,"trac_diff_url":732,"vulnerabilities":733,"is_current":55},"8.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.2",[734,735,736],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":738,"download_url":739,"svn_tag_url":740,"released_at":39,"has_diff":55,"diff_files_changed":741,"diff_lines":39,"trac_diff_url":742,"vulnerabilities":743,"is_current":55},"8.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.1",[744,745,746],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":748,"download_url":749,"svn_tag_url":750,"released_at":39,"has_diff":55,"diff_files_changed":751,"diff_lines":39,"trac_diff_url":752,"vulnerabilities":753,"is_current":55},"8.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.8.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F8.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F8.0.0",[754,755,756],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":758,"download_url":759,"svn_tag_url":760,"released_at":39,"has_diff":55,"diff_files_changed":761,"diff_lines":39,"trac_diff_url":762,"vulnerabilities":763,"is_current":55},"7.1.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.1.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.1.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.6",[764,765,766],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":768,"download_url":769,"svn_tag_url":770,"released_at":39,"has_diff":55,"diff_files_changed":771,"diff_lines":39,"trac_diff_url":772,"vulnerabilities":773,"is_current":55},"7.1.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.1.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.1.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.5",[774,775,776],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":778,"download_url":779,"svn_tag_url":780,"released_at":39,"has_diff":55,"diff_files_changed":781,"diff_lines":39,"trac_diff_url":782,"vulnerabilities":783,"is_current":55},"7.1.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.1.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.1.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.4",[784,785,786],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":788,"download_url":789,"svn_tag_url":790,"released_at":39,"has_diff":55,"diff_files_changed":791,"diff_lines":39,"trac_diff_url":792,"vulnerabilities":793,"is_current":55},"7.1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.2",[794,795,796],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":798,"download_url":799,"svn_tag_url":800,"released_at":39,"has_diff":55,"diff_files_changed":801,"diff_lines":39,"trac_diff_url":802,"vulnerabilities":803,"is_current":55},"7.1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.1",[804,805,806],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":808,"download_url":809,"svn_tag_url":810,"released_at":39,"has_diff":55,"diff_files_changed":811,"diff_lines":39,"trac_diff_url":812,"vulnerabilities":813,"is_current":55},"7.1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.1.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.9&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.1.0",[814,815,816],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":818,"download_url":819,"svn_tag_url":820,"released_at":39,"has_diff":55,"diff_files_changed":821,"diff_lines":39,"trac_diff_url":822,"vulnerabilities":823,"is_current":55},"7.0.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.8&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.9",[824,825,826],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":828,"download_url":829,"svn_tag_url":830,"released_at":39,"has_diff":55,"diff_files_changed":831,"diff_lines":39,"trac_diff_url":832,"vulnerabilities":833,"is_current":55},"7.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.7&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.8",[834,835,836],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":838,"download_url":839,"svn_tag_url":840,"released_at":39,"has_diff":55,"diff_files_changed":841,"diff_lines":39,"trac_diff_url":842,"vulnerabilities":843,"is_current":55},"7.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.7",[844,845,846],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":848,"download_url":849,"svn_tag_url":850,"released_at":39,"has_diff":55,"diff_files_changed":851,"diff_lines":39,"trac_diff_url":852,"vulnerabilities":853,"is_current":55},"7.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.6",[854,855,856],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":858,"download_url":859,"svn_tag_url":860,"released_at":39,"has_diff":55,"diff_files_changed":861,"diff_lines":39,"trac_diff_url":862,"vulnerabilities":863,"is_current":55},"7.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.5",[864,865,866],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":868,"download_url":869,"svn_tag_url":870,"released_at":39,"has_diff":55,"diff_files_changed":871,"diff_lines":39,"trac_diff_url":872,"vulnerabilities":873,"is_current":55},"7.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.3&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.4",[874,875,876],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":878,"download_url":879,"svn_tag_url":880,"released_at":39,"has_diff":55,"diff_files_changed":881,"diff_lines":39,"trac_diff_url":882,"vulnerabilities":883,"is_current":55},"7.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.3",[884,885,886],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":888,"download_url":889,"svn_tag_url":890,"released_at":39,"has_diff":55,"diff_files_changed":891,"diff_lines":39,"trac_diff_url":892,"vulnerabilities":893,"is_current":55},"7.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.2",[894,895,896],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":898,"download_url":899,"svn_tag_url":900,"released_at":39,"has_diff":55,"diff_files_changed":901,"diff_lines":39,"trac_diff_url":902,"vulnerabilities":903,"is_current":55},"7.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.1",[904,905,906],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":908,"download_url":909,"svn_tag_url":910,"released_at":39,"has_diff":55,"diff_files_changed":911,"diff_lines":39,"trac_diff_url":912,"vulnerabilities":913,"is_current":55},"7.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.7.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F7.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.1.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F7.0.0",[914,915,916],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":918,"download_url":919,"svn_tag_url":920,"released_at":39,"has_diff":55,"diff_files_changed":921,"diff_lines":39,"trac_diff_url":922,"vulnerabilities":923,"is_current":55},"6.1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.1.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.1.2",[924,925,926],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":928,"download_url":929,"svn_tag_url":930,"released_at":39,"has_diff":55,"diff_files_changed":931,"diff_lines":39,"trac_diff_url":932,"vulnerabilities":933,"is_current":55},"6.1.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.1.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.1.1",[934,935,936],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":938,"download_url":939,"svn_tag_url":940,"released_at":39,"has_diff":55,"diff_files_changed":941,"diff_lines":39,"trac_diff_url":942,"vulnerabilities":943,"is_current":55},"6.1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.1.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.9&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.1.0",[944,945,946],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":948,"download_url":949,"svn_tag_url":950,"released_at":39,"has_diff":55,"diff_files_changed":951,"diff_lines":39,"trac_diff_url":952,"vulnerabilities":953,"is_current":55},"6.0.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.8&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.9",[954,955,956],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":958,"download_url":959,"svn_tag_url":960,"released_at":39,"has_diff":55,"diff_files_changed":961,"diff_lines":39,"trac_diff_url":962,"vulnerabilities":963,"is_current":55},"6.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.7&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.8",[964,965,966],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":968,"download_url":969,"svn_tag_url":970,"released_at":39,"has_diff":55,"diff_files_changed":971,"diff_lines":39,"trac_diff_url":972,"vulnerabilities":973,"is_current":55},"6.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.7",[974,975,976],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":978,"download_url":979,"svn_tag_url":980,"released_at":39,"has_diff":55,"diff_files_changed":981,"diff_lines":39,"trac_diff_url":982,"vulnerabilities":983,"is_current":55},"6.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.6",[984,985,986],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":988,"download_url":989,"svn_tag_url":990,"released_at":39,"has_diff":55,"diff_files_changed":991,"diff_lines":39,"trac_diff_url":992,"vulnerabilities":993,"is_current":55},"6.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.5",[994,995,996],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":998,"download_url":999,"svn_tag_url":1000,"released_at":39,"has_diff":55,"diff_files_changed":1001,"diff_lines":39,"trac_diff_url":1002,"vulnerabilities":1003,"is_current":55},"6.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.3&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.4",[1004,1005,1006],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1008,"download_url":1009,"svn_tag_url":1010,"released_at":39,"has_diff":55,"diff_files_changed":1011,"diff_lines":39,"trac_diff_url":1012,"vulnerabilities":1013,"is_current":55},"6.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.3",[1014,1015,1016],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1018,"download_url":1019,"svn_tag_url":1020,"released_at":39,"has_diff":55,"diff_files_changed":1021,"diff_lines":39,"trac_diff_url":1022,"vulnerabilities":1023,"is_current":55},"6.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.2",[1024,1025,1026],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1028,"download_url":1029,"svn_tag_url":1030,"released_at":39,"has_diff":55,"diff_files_changed":1031,"diff_lines":39,"trac_diff_url":1032,"vulnerabilities":1033,"is_current":55},"6.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.1",[1034,1035,1036],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1038,"download_url":1039,"svn_tag_url":1040,"released_at":39,"has_diff":55,"diff_files_changed":1041,"diff_lines":39,"trac_diff_url":1042,"vulnerabilities":1043,"is_current":55},"6.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.6.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F6.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.8&new_path=%2Fwebsite-llms-txt%2Ftags%2F6.0.0",[1044,1045,1046],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1048,"download_url":1049,"svn_tag_url":1050,"released_at":39,"has_diff":55,"diff_files_changed":1051,"diff_lines":39,"trac_diff_url":1052,"vulnerabilities":1053,"is_current":55},"5.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.7&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.8",[1054,1055,1056],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1058,"download_url":1059,"svn_tag_url":1060,"released_at":39,"has_diff":55,"diff_files_changed":1061,"diff_lines":39,"trac_diff_url":1062,"vulnerabilities":1063,"is_current":55},"5.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.7",[1064,1065,1066],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1068,"download_url":1069,"svn_tag_url":1070,"released_at":39,"has_diff":55,"diff_files_changed":1071,"diff_lines":39,"trac_diff_url":1072,"vulnerabilities":1073,"is_current":55},"5.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.6",[1074,1075,1076],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1078,"download_url":1079,"svn_tag_url":1080,"released_at":39,"has_diff":55,"diff_files_changed":1081,"diff_lines":39,"trac_diff_url":1082,"vulnerabilities":1083,"is_current":55},"5.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.5",[1084,1085,1086],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1088,"download_url":1089,"svn_tag_url":1090,"released_at":39,"has_diff":55,"diff_files_changed":1091,"diff_lines":39,"trac_diff_url":1092,"vulnerabilities":1093,"is_current":55},"5.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.3&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.4",[1094,1095,1096],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1098,"download_url":1099,"svn_tag_url":1100,"released_at":39,"has_diff":55,"diff_files_changed":1101,"diff_lines":39,"trac_diff_url":1102,"vulnerabilities":1103,"is_current":55},"5.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.3",[1104,1105,1106],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1108,"download_url":1109,"svn_tag_url":1110,"released_at":39,"has_diff":55,"diff_files_changed":1111,"diff_lines":39,"trac_diff_url":1112,"vulnerabilities":1113,"is_current":55},"5.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.2",[1114,1115,1116],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1118,"download_url":1119,"svn_tag_url":1120,"released_at":39,"has_diff":55,"diff_files_changed":1121,"diff_lines":39,"trac_diff_url":1122,"vulnerabilities":1123,"is_current":55},"5.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.1",[1124,1125,1126],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1128,"download_url":1129,"svn_tag_url":1130,"released_at":39,"has_diff":55,"diff_files_changed":1131,"diff_lines":39,"trac_diff_url":1132,"vulnerabilities":1133,"is_current":55},"5.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.5.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F5.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.9&new_path=%2Fwebsite-llms-txt%2Ftags%2F5.0.0",[1134,1135,1136],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1138,"download_url":1139,"svn_tag_url":1140,"released_at":39,"has_diff":55,"diff_files_changed":1141,"diff_lines":39,"trac_diff_url":1142,"vulnerabilities":1143,"is_current":55},"4.0.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.8&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.9",[1144,1145,1146],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1148,"download_url":1149,"svn_tag_url":1150,"released_at":39,"has_diff":55,"diff_files_changed":1151,"diff_lines":39,"trac_diff_url":1152,"vulnerabilities":1153,"is_current":55},"4.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.7&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.8",[1154,1155,1156],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1158,"download_url":1159,"svn_tag_url":1160,"released_at":39,"has_diff":55,"diff_files_changed":1161,"diff_lines":39,"trac_diff_url":1162,"vulnerabilities":1163,"is_current":55},"4.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.6&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.7",[1164,1165,1166],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1168,"download_url":1169,"svn_tag_url":1170,"released_at":39,"has_diff":55,"diff_files_changed":1171,"diff_lines":39,"trac_diff_url":1172,"vulnerabilities":1173,"is_current":55},"4.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.5&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.6",[1174,1175,1176],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1178,"download_url":1179,"svn_tag_url":1180,"released_at":39,"has_diff":55,"diff_files_changed":1181,"diff_lines":39,"trac_diff_url":1182,"vulnerabilities":1183,"is_current":55},"4.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.4&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.5",[1184,1185,1186],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1188,"download_url":1189,"svn_tag_url":1190,"released_at":39,"has_diff":55,"diff_files_changed":1191,"diff_lines":39,"trac_diff_url":1192,"vulnerabilities":1193,"is_current":55},"4.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.3&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.4",[1194,1195,1196],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1198,"download_url":1199,"svn_tag_url":1200,"released_at":39,"has_diff":55,"diff_files_changed":1201,"diff_lines":39,"trac_diff_url":1202,"vulnerabilities":1203,"is_current":55},"4.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.2&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.3",[1204,1205,1206],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1208,"download_url":1209,"svn_tag_url":1210,"released_at":39,"has_diff":55,"diff_files_changed":1211,"diff_lines":39,"trac_diff_url":1212,"vulnerabilities":1213,"is_current":55},"4.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.1&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.2",[1214,1215,1216],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1218,"download_url":1219,"svn_tag_url":1220,"released_at":39,"has_diff":55,"diff_files_changed":1221,"diff_lines":39,"trac_diff_url":1222,"vulnerabilities":1223,"is_current":55},"4.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.1",[1224,1225,1226],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1228,"download_url":1229,"svn_tag_url":1230,"released_at":39,"has_diff":55,"diff_files_changed":1231,"diff_lines":39,"trac_diff_url":1232,"vulnerabilities":1233,"is_current":55},"4.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.4.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F4.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F3.0.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F4.0.0",[1234,1235,1236],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1238,"download_url":1239,"svn_tag_url":1240,"released_at":39,"has_diff":55,"diff_files_changed":1241,"diff_lines":39,"trac_diff_url":1242,"vulnerabilities":1243,"is_current":55},"3.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.3.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F3.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwebsite-llms-txt%2Ftags%2F2.0.0&new_path=%2Fwebsite-llms-txt%2Ftags%2F3.0.0",[1244,1245,1246],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"version":1248,"download_url":1249,"svn_tag_url":1250,"released_at":39,"has_diff":55,"diff_files_changed":1251,"diff_lines":39,"trac_diff_url":39,"vulnerabilities":1252,"is_current":55},"2.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-llms-txt.2.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwebsite-llms-txt\u002Ftags\u002F2.0.0\u002F",[],[1253,1254,1255],{"id":83,"url_slug":84,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6},{"id":35,"url_slug":36,"title":37,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":6},{"id":65,"url_slug":66,"title":67,"severity":41,"cvss_score":69,"vuln_type":44,"patched_in_version":6}]