| Plugin Name | Website LLMs.txt |
|---|---|
| Type of Vulnerability | Cross-Site Scripting (XSS) |
| CVE Number | CVE-2026-6711 |
| Urgency | Low |
| CVE Publish Date | 2026-04-20 |
| Source URL | CVE-2026-6711 |
Reflected XSS in Website LLMs.txt (≤ 8.2.6): What WordPress Site Owners Must Do Now
Author: Hong Kong Security Expert | Date: 2026-04-21
A reflected Cross-Site Scripting (XSS) vulnerability affecting the Website LLMs.txt WordPress plugin (versions ≤ 8.2.6) was published on 20 April 2026 and assigned CVE-2026-6711. The issue was patched in version 8.2.7. The vulnerability is an XSS (OWASP A7) and reported CVSS is 6.1.
This advisory is written from a pragmatic Hong Kong security expert perspective: clear, direct guidance for site owners and administrators to reduce risk quickly and confidently.
Executive summary (TL;DR)
- Vulnerability: Reflected Cross-Site Scripting (XSS) in Website LLMs.txt plugin versions ≤ 8.2.6 (patched in 8.2.7).
- CVE: CVE-2026-6711.
- Risk: Moderate (CVSS 6.1) — requires user interaction but can be used in phishing/malvertising campaigns to steal session data, perform account actions, or inject malicious content.
- Immediate action: Update the plugin to 8.2.7 or later. If immediate update is not possible, apply short-term mitigations: block or harden affected endpoints, restrict access, and virtual-patch where possible.
- Longer term: Enforce correct output encoding, deploy Content Security Policy (CSP), maintain automated patching, and use layered protections (WAF, logging, monitoring).
What is reflected XSS and why should you care?
Cross-Site Scripting (XSS) allows an attacker to cause a victim’s browser to execute attacker-controlled script in the context of a trusted site. Reflected XSS occurs when a server includes unescaped user-supplied input in the HTTP response. When a user follows a crafted link, the injected script runs immediately in their browser.
Why this matters for WordPress:
- XSS can enable account takeover, data theft (cookies or tokens), unauthorized actions performed as authenticated users, redirects to malicious sites, or persistent SEO spam.
- WordPress sites commonly involve editorial workflows and privileged backends. If an administrator is targeted with a crafted link, the potential damage is much greater than for anonymous visitors.
- Reflected XSS is an attractive vector for targeted phishing: an attacker can send an admin a seemingly legitimate link (email or chat) which, when opened, runs the payload in the admin’s browser.
The Website LLMs.txt plugin vulnerability (overview)
- Affected plugin: Website LLMs.txt
- Affected versions: ≤ 8.2.6
- Patched in: 8.2.7
- CVE: CVE-2026-6711
- Risk level: Low to Moderate (reported CVSS 6.1)
- Attack vector: Reflected XSS via HTTP parameters in a plugin endpoint that echoes unescaped user input.
Reports indicate a plugin endpoint reflected user-supplied values into HTML output without proper escaping or encoding, enabling script injection when a victim visits a crafted URL or clicks a malicious link. Although the originating request may be unauthenticated, practical exploitation often relies on user interaction by authenticated users (for example, an administrator).
Potential impact and exploitation scenarios
Reflected XSS can be used in several ways depending on the attacker’s objective and the victim:
-
Admin session theft
If an administrator visits a crafted URL while authenticated, a payload can read cookies or session tokens (if not properly protected) and exfiltrate them to the attacker, enabling account impersonation.
-
Privileged action framing
A payload can perform actions in the context of an authenticated admin via REST endpoints or admin pages (create users, install plugins/themes, modify settings), potentially leading to full site takeover.
-
Content injection and SEO spam
Injected scripts can alter front-end content, insert spam links or hidden iframes, and damage SEO and visitor trust.
-
Drive-by malware or redirects
Visitors may be redirected to malware distribution or ad-fraud networks.
-
Phishing amplification
Attackers can create admin-looking pages prompting for re-authentication and harvest credentials.
Even though reflected XSS requires user interaction, mass phishing campaigns often succeed at scale by relying on a small percentage of clicks.
Immediate steps for site owners (recommended ordering)
Treat this notification as actionable. Do the following now, in order:
-
Update the plugin to 8.2.7 or later
The vendor released a patch. Apply the update to all affected sites immediately. If you manage many sites, coordinate rollout with automation or a management console and test in staging for high-risk production sites.
-
If you cannot update immediately, apply temporary mitigations
- Disable or remove the plugin until you can update. Removal is the safest stopgap when the plugin is not required.
- Restrict access to the plugin’s public endpoints using webserver rules or IP allow lists.
- Apply virtual-patching rules in your application firewall to block requests containing typical XSS payload patterns targeting the endpoint or parameter(s).
-
Use a Web Application Firewall (WAF) or host-level protections
Block suspicious requests with script tags, event handlers, or common XSS vectors in query parameters. Implement virtual patching to stop malicious requests before they reach WordPress.
-
Notify and educate site users
Inform administrators and editors about potential phishing links. Advise them not to click unexpected links and to verify administrative notifications via a separate channel. Consider resetting sessions for highly privileged users if exposure is suspected.
-
Scan for indicators of compromise (IOC)
Search logs for requests targeting the plugin path and suspicious query parameters. Scan the site for injected scripts, unknown admin users, modified files, or unauthorized settings. Look for unusual outbound connections.
-
Rotate secrets where necessary
If you find evidence of compromise, rotate API keys, reset admin passwords, and reissue any exposed credentials.
-
Harden site configuration
Add Content Security Policy (CSP) headers, set Secure and HttpOnly flags on cookies, enable SameSite, and set X-Content-Type-Options: nosniff. Enforce least privilege: remove unnecessary admin accounts and use role separation.
How to detect whether your site has been impacted
Check for the following signs:
- Unexpected admin activity: new admin users, changed site settings, new plugins/themes installed, or unexpected content published.
- Strange script tags or iframes in pages or posts. Search site content for <script>, eval(, document.write, or suspicious inline event handlers.
- Login attempts or sessions from unusual IPs or foreign geolocations.
- Unexplained redirects when visiting site pages.
- Access logs containing requests to the plugin path with unusual query strings.
Search techniques and examples (run with caution and backups):
-- Example SQL (run carefully; take backups first)
SELECT ID, post_title FROM wp_posts WHERE post_content LIKE '%<script%';
Also:
- Check access logs for repeated requests to /wp-content/plugins/website-llms-txt/ or similarly named endpoints.
- Inspect recent modification times for plugin and theme files (attackers may modify files to persist).
If you find suspicious artifacts, isolate the affected site (take it offline or enable maintenance) while performing a forensic check.
Short-term mitigation examples
If you cannot update immediately, apply the following mitigations. Test in staging first.
1. Block access via .htaccess (Apache)
Block requests to the plugin folder from public access if the plugin has no public-facing visitor functionality:
# Block public access to Website LLMs.txt plugin folder
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteRule ^wp-content/plugins/website-llms-txt/ - [F,L]
</IfModule>
This returns a 403 for any request to files inside that folder; test to ensure legitimate behavior is not broken.
2. Nginx rule to deny access to plugin endpoints
location ~* /wp-content/plugins/website-llms-txt/ {
deny all;
return 403;
}
3. WAF/virtual patch rules (conceptual)
Block requests that target the vulnerable endpoint and contain script tags or typical XSS patterns in parameters. Example pseudo-regex logic: