{"id":24087,"date":"2026-04-03T08:00:00","date_gmt":"2026-04-03T11:00:00","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=24087"},"modified":"2026-04-01T16:55:59","modified_gmt":"2026-04-01T19:55:59","slug":"vulnerabilidade-em-plugin-do-wordpress","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2026\/04\/exploits\/vulnerabilidade-em-plugin-do-wordpress\/","title":{"rendered":"Vulnerabilidade em plugin do WordPress"},"content":{"rendered":"\n<p style=\"text-align: justify;\" data-section-id=\"x4vfr5\" data-start=\"5\" data-end=\"98\"><span role=\"text\"><strong data-start=\"7\" data-end=\"98\">Vulnerabilidade em plugin do WordPress: Quando 800 mil sites se tornam alvos potenciais<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"119\" data-end=\"387\">O ecossistema do <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">WordPress<\/span><\/span> continua sendo um dos pilares da internet moderna, alimentando milh\u00f5es de sites corporativos, blogs e plataformas de e-commerce. No entanto, sua popularidade tamb\u00e9m o torna um alvo recorrente para cibercriminosos.<\/p>\n<p style=\"text-align: justify;\" data-start=\"389\" data-end=\"639\">Recentemente, uma vulnerabilidade cr\u00edtica em um plugin amplamente utilizado colocou cerca de <strong data-start=\"482\" data-end=\"508\">800 mil sites em risco<\/strong>, evidenciando mais uma vez como extens\u00f5es de terceiros representam um dos principais pontos de fragilidade dentro de sistemas CMS.<\/p>\n<p data-start=\"389\" data-end=\"639\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"141gweu\" data-start=\"646\" data-end=\"684\"><span role=\"text\"><strong data-start=\"649\" data-end=\"684\">1. Entendendo a vulnerabilidade<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"686\" data-end=\"901\">A falha identificada est\u00e1 relacionada a um plugin com ampla base instalada, o que amplifica significativamente o impacto do incidente. De acordo com an\u00e1lises de seguran\u00e7a, vulnerabilidades desse tipo podem permitir:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"903\" data-end=\"1015\">\n<li data-section-id=\"ei7efh\" data-start=\"903\" data-end=\"941\">\n<p>Execu\u00e7\u00e3o de a\u00e7\u00f5es sem autentica\u00e7\u00e3o<\/p>\n<\/li>\n<li data-section-id=\"1iazpz0\" data-start=\"942\" data-end=\"974\">\n<p>Manipula\u00e7\u00e3o de dados do site<\/p>\n<\/li>\n<li data-section-id=\"uvuzx5\" data-start=\"975\" data-end=\"1015\">\n<p>Comprometimento completo do ambiente<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"1017\" data-end=\"1220\">Casos semelhantes mostram que falhas em plugins podem permitir acesso indevido mesmo sem credenciais v\u00e1lidas, explorando erros de valida\u00e7\u00e3o e l\u00f3gica de autentica\u00e7\u00e3o .<\/p>\n<p style=\"text-align: justify;\" data-start=\"1222\" data-end=\"1421\">Al\u00e9m disso, incidentes recentes indicam que centenas de milhares de sites podem ser afetados simultaneamente quando plugins populares apresentam falhas cr\u00edticas.<\/p>\n<p data-start=\"1222\" data-end=\"1421\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"k2j95i\" data-start=\"1428\" data-end=\"1474\"><span role=\"text\"><strong data-start=\"1431\" data-end=\"1474\">2. Por que plugins s\u00e3o o elo mais fraco<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"1476\" data-end=\"1625\">O WordPress \u00e9 altamente modular, permitindo a instala\u00e7\u00e3o de milhares de plugins. Essa flexibilidade, embora poderosa, introduz riscos significativos.<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"9lwsqi\" data-start=\"1627\" data-end=\"1652\"><span role=\"text\"><strong data-start=\"1631\" data-end=\"1652\">Fatores cr\u00edticos:<\/strong><\/span><\/p>\n<ul style=\"text-align: justify;\" data-start=\"1654\" data-end=\"1801\">\n<li data-section-id=\"fql2aa\" data-start=\"1654\" data-end=\"1711\">\n<p>Desenvolvimento descentralizado (nem sempre auditado)<\/p>\n<\/li>\n<li data-section-id=\"lp07cy\" data-start=\"1712\" data-end=\"1743\">\n<p>Atualiza\u00e7\u00f5es inconsistentes<\/p>\n<\/li>\n<li data-section-id=\"1f1t6ow\" data-start=\"1744\" data-end=\"1801\">\n<p>C\u00f3digo de terceiros com baixa maturidade de seguran\u00e7a<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"1803\" data-end=\"2025\">Estudos acad\u00eamicos apontam que vulnerabilidades em plugins s\u00e3o mais comuns do que no n\u00facleo do sistema, principalmente devido \u00e0 diversidade de desenvolvedores e pr\u00e1ticas de manuten\u00e7\u00e3o.<\/p>\n<p data-start=\"1803\" data-end=\"2025\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"ts16u4\" data-start=\"2032\" data-end=\"2075\"><span role=\"text\"><strong data-start=\"2035\" data-end=\"2075\">3. Vetores de explora\u00e7\u00e3o mais comuns<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"2077\" data-end=\"2146\">A explora\u00e7\u00e3o desse tipo de falha geralmente segue padr\u00f5es conhecidos:<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"15g5gku\" data-start=\"2148\" data-end=\"2191\"><span role=\"text\"><strong data-start=\"2152\" data-end=\"2191\">3.1 Execu\u00e7\u00e3o remota de c\u00f3digo (RCE)<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"2192\" data-end=\"2256\">Permite que o atacante execute comandos diretamente no servidor.<\/p>\n<p data-start=\"2192\" data-end=\"2256\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1f744fr\" data-start=\"2258\" data-end=\"2293\"><span role=\"text\"><strong data-start=\"2262\" data-end=\"2293\">3.2 Escalada de privil\u00e9gios<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"2294\" data-end=\"2344\">Usu\u00e1rios comuns podem obter acesso administrativo.<\/p>\n<p data-start=\"2294\" data-end=\"2344\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"17gqa2g\" data-start=\"2346\" data-end=\"2387\"><span role=\"text\"><strong data-start=\"2350\" data-end=\"2387\">3.3 Inje\u00e7\u00e3o de conte\u00fado malicioso<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"2388\" data-end=\"2455\">Inser\u00e7\u00e3o de scripts ou redirecionamentos para p\u00e1ginas fraudulentas.<\/p>\n<p data-start=\"2388\" data-end=\"2455\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"bw9nga\" data-start=\"2457\" data-end=\"2498\"><span role=\"text\"><strong data-start=\"2461\" data-end=\"2498\">3.4 Upload de arquivos maliciosos<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"2499\" data-end=\"2561\">Instala\u00e7\u00e3o de backdoors e webshells para controle persistente.<\/p>\n<p style=\"text-align: justify;\" data-start=\"2563\" data-end=\"2739\">Ataques anteriores demonstram que vulnerabilidades em plugins podem permitir at\u00e9 o upload de arquivos maliciosos e controle total do site.<\/p>\n<p data-start=\"2563\" data-end=\"2739\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"aed9ds\" data-start=\"2746\" data-end=\"2801\"><span role=\"text\"><strong data-start=\"2749\" data-end=\"2801\">4. Impacto em escala: O perigo dos 800 mil sites<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"2803\" data-end=\"2921\">Quando uma falha afeta centenas de milhares de instala\u00e7\u00f5es, o impacto deixa de ser individual e passa a ser sist\u00eamico.<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"5q9k1b\" data-start=\"2923\" data-end=\"2949\"><span role=\"text\"><strong data-start=\"2927\" data-end=\"2949\">Principais riscos:<\/strong><\/span><\/p>\n<ul style=\"text-align: justify;\" data-start=\"2951\" data-end=\"3130\">\n<li data-section-id=\"w7ccns\" data-start=\"2951\" data-end=\"3001\">\n<p><strong data-start=\"2953\" data-end=\"2976\">Defacement em massa<\/strong> (altera\u00e7\u00e3o de p\u00e1ginas)<\/p>\n<\/li>\n<li data-section-id=\"1e5v2kr\" data-start=\"3002\" data-end=\"3057\">\n<p><strong data-start=\"3004\" data-end=\"3031\">Distribui\u00e7\u00e3o de malware<\/strong> via sites comprometidos<\/p>\n<\/li>\n<li data-section-id=\"1f5qxnl\" data-start=\"3058\" data-end=\"3103\">\n<p><strong data-start=\"3060\" data-end=\"3101\">Campanhas de phishing em larga escala<\/strong><\/p>\n<\/li>\n<li data-section-id=\"g10lny\" data-start=\"3104\" data-end=\"3130\">\n<p><strong data-start=\"3106\" data-end=\"3128\">Cria\u00e7\u00e3o de botnets<\/strong><\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3132\" data-end=\"3279\">Al\u00e9m disso, atacantes frequentemente automatizam a explora\u00e7\u00e3o, varrendo a internet em busca de vers\u00f5es vulner\u00e1veis logo ap\u00f3s a divulga\u00e7\u00e3o da falha.<\/p>\n<p data-start=\"3132\" data-end=\"3279\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"tph8gn\" data-start=\"3286\" data-end=\"3341\"><span role=\"text\"><strong data-start=\"3289\" data-end=\"3341\">5. Cadeia de ataque: Do plugin ao controle total<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"3343\" data-end=\"3421\">Uma vez explorada a vulnerabilidade, o atacante pode seguir uma cadeia t\u00edpica:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"3423\" data-end=\"3599\">\n<li data-section-id=\"1mbuoea\" data-start=\"3423\" data-end=\"3455\">\n<p>Explora\u00e7\u00e3o inicial da falha<\/p>\n<\/li>\n<li data-section-id=\"12pjiyx\" data-start=\"3456\" data-end=\"3500\">\n<p>Cria\u00e7\u00e3o de usu\u00e1rio administrador oculto<\/p>\n<\/li>\n<li data-section-id=\"cm7iar\" data-start=\"3501\" data-end=\"3528\">\n<p>Instala\u00e7\u00e3o de backdoor<\/p>\n<\/li>\n<li data-section-id=\"10idbh2\" data-start=\"3529\" data-end=\"3573\">\n<p>Movimenta\u00e7\u00e3o lateral dentro do servidor<\/p>\n<\/li>\n<li data-section-id=\"1xfcxu8\" data-start=\"3574\" data-end=\"3599\">\n<p>Exfiltra\u00e7\u00e3o de dados<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3601\" data-end=\"3704\">Esse tipo de comprometimento pode ocorrer em segundos, especialmente quando n\u00e3o h\u00e1 monitoramento ativo.<\/p>\n<p data-start=\"3601\" data-end=\"3704\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1hn103u\" data-start=\"3711\" data-end=\"3741\"><span role=\"text\"><strong data-start=\"3714\" data-end=\"3741\">6. Desafios na detec\u00e7\u00e3o<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"3743\" data-end=\"3816\">Detectar esse tipo de ataque n\u00e3o \u00e9 trivial. Entre os principais desafios:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"3818\" data-end=\"3957\">\n<li data-section-id=\"98qbxr\" data-start=\"3818\" data-end=\"3862\">\n<p>Explora\u00e7\u00e3o silenciosa sem logs evidentes<\/p>\n<\/li>\n<li data-section-id=\"9qumga\" data-start=\"3863\" data-end=\"3909\">\n<p>Uso de requisi\u00e7\u00f5es aparentemente leg\u00edtimas<\/p>\n<\/li>\n<li data-section-id=\"1p62pdw\" data-start=\"3910\" data-end=\"3957\">\n<p>Backdoors escondidos em arquivos do sistema<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3959\" data-end=\"4020\">Al\u00e9m disso, muitos administradores s\u00f3 percebem o ataque ap\u00f3s:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"4022\" data-end=\"4109\">\n<li data-section-id=\"1dzukt1\" data-start=\"4022\" data-end=\"4046\">\n<p>Queda de performance<\/p>\n<\/li>\n<li data-section-id=\"2n9cff\" data-start=\"4047\" data-end=\"4083\">\n<p>Bloqueio por mecanismos de busca<\/p>\n<\/li>\n<li data-section-id=\"ikrndr\" data-start=\"4084\" data-end=\"4109\">\n<p>Den\u00fancias de usu\u00e1rios<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1ti7nll\" data-start=\"4116\" data-end=\"4152\"><span role=\"text\"><strong data-start=\"4119\" data-end=\"4152\">7. Boas pr\u00e1ticas de mitiga\u00e7\u00e3o<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-section-id=\"idkncq\" data-start=\"4154\" data-end=\"4192\"><span role=\"text\"><strong data-start=\"4158\" data-end=\"4192\">Para administradores de sites:<\/strong><\/span><\/p>\n<ul style=\"text-align: justify;\" data-start=\"4194\" data-end=\"4307\">\n<li data-section-id=\"65baw8\" data-start=\"4194\" data-end=\"4231\">\n<p>Manter plugins sempre atualizados<\/p>\n<\/li>\n<li data-section-id=\"mu03d6\" data-start=\"4232\" data-end=\"4266\">\n<p>Remover plugins n\u00e3o utilizados<\/p>\n<\/li>\n<li data-section-id=\"1dqo52r\" data-start=\"4267\" data-end=\"4307\">\n<p>Utilizar apenas extens\u00f5es confi\u00e1veis<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1pdyvm6\" data-start=\"4314\" data-end=\"4348\"><span role=\"text\"><strong data-start=\"4318\" data-end=\"4348\">Para equipes de seguran\u00e7a:<\/strong><\/span><\/p>\n<ul style=\"text-align: justify;\" data-start=\"4350\" data-end=\"4479\">\n<li data-section-id=\"fk8x\" data-start=\"4350\" data-end=\"4396\">\n<p>Implementar WAF (Web Application Firewall)<\/p>\n<\/li>\n<li data-section-id=\"1ienwqx\" data-start=\"4397\" data-end=\"4425\">\n<p>Monitorar logs de acesso<\/p>\n<\/li>\n<li data-section-id=\"1gw01jg\" data-start=\"4426\" data-end=\"4479\">\n<p>Realizar varreduras cont\u00ednuas de vulnerabilidades<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1jd6sz2\" data-start=\"4486\" data-end=\"4515\"><span role=\"text\"><strong data-start=\"4490\" data-end=\"4515\">Para desenvolvedores:<\/strong><\/span><\/p>\n<ul style=\"text-align: justify;\" data-start=\"4517\" data-end=\"4645\">\n<li data-section-id=\"n9q1bc\" data-start=\"4517\" data-end=\"4559\">\n<p>Adotar pr\u00e1ticas seguras de codifica\u00e7\u00e3o<\/p>\n<\/li>\n<li data-section-id=\"sx9j7x\" data-start=\"4560\" data-end=\"4595\">\n<p>Validar entradas e autentica\u00e7\u00e3o<\/p>\n<\/li>\n<li data-section-id=\"9jmuhj\" data-start=\"4596\" data-end=\"4645\">\n<p>Implementar testes de seguran\u00e7a automatizados<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"x45itu\" data-start=\"4652\" data-end=\"4697\"><span role=\"text\"><strong data-start=\"4655\" data-end=\"4697\">8. Tend\u00eancias no ecossistema WordPress<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"4699\" data-end=\"4795\">O cen\u00e1rio atual indica um crescimento cont\u00ednuo de ataques focados em plugins, com destaque para:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"4797\" data-end=\"4924\">\n<li data-section-id=\"uj7f1y\" data-start=\"4797\" data-end=\"4840\">\n<p>Explora\u00e7\u00e3o automatizada em larga escala<\/p>\n<\/li>\n<li data-section-id=\"lvd3ys\" data-start=\"4841\" data-end=\"4884\">\n<p>Ataques zero-day em extens\u00f5es populares<\/p>\n<\/li>\n<li data-section-id=\"1dkzvl0\" data-start=\"4885\" data-end=\"4924\">\n<p>Uso de IA para descoberta de falhas<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"4926\" data-end=\"5034\">A pr\u00f3pria arquitetura extens\u00edvel do WordPress, embora vantajosa, continuar\u00e1 sendo um vetor cr\u00edtico de risco.<\/p>\n<p data-start=\"4926\" data-end=\"5034\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"jl3ev6\" data-start=\"5041\" data-end=\"5057\"><span role=\"text\"><strong data-start=\"5044\" data-end=\"5057\">Conclus\u00e3o<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\" data-start=\"5059\" data-end=\"5297\">A vulnerabilidade que colocou 800 mil sites em risco refor\u00e7a uma realidade incontest\u00e1vel: <strong data-start=\"5149\" data-end=\"5296\">a seguran\u00e7a de um sistema \u00e9 t\u00e3o forte quanto seu componente mais fraco \u2014 e, no caso do WordPress, esse componente frequentemente s\u00e3o os plugins<\/strong>.<\/p>\n<p style=\"text-align: justify;\" data-start=\"5299\" data-end=\"5440\">A ado\u00e7\u00e3o de pr\u00e1ticas proativas de seguran\u00e7a, combinada com monitoramento cont\u00ednuo e atualiza\u00e7\u00e3o constante, n\u00e3o \u00e9 mais opcional \u2014 \u00e9 essencial.<\/p>\n<p style=\"text-align: justify;\" data-start=\"5442\" data-end=\"5592\">Organiza\u00e7\u00f5es que negligenciam esses cuidados se tornam alvos f\u00e1ceis em um cen\u00e1rio onde ataques s\u00e3o cada vez mais automatizados, r\u00e1pidos e silenciosos.<\/p>\n<p data-start=\"5442\" data-end=\"5592\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1g3lc2e\" data-start=\"5599\" data-end=\"5632\"><span role=\"text\"><strong data-start=\"5602\" data-end=\"5632\">Refer\u00eancias Bibliogr\u00e1ficas<\/strong><\/span><\/p>\n<ul data-start=\"5634\" data-end=\"6141\">\n<li data-section-id=\"pa5u7q\" data-start=\"5634\" data-end=\"5833\"><strong>BOLETIM SEC.<\/strong> <em data-start=\"5650\" data-end=\"5720\">Vulnerabilidade em plugin do WordPress coloca 800 mil sites em risco<\/em>.<br data-start=\"5721\" data-end=\"5724\" \/>Dispon\u00edvel em: <a class=\"decorated-link\" href=\"https:\/\/boletimsec.com\/vulnerabilidade-em-plugin-so-wordpress-coloca-800-mil-sites-em-risco\/\" target=\"_blank\" rel=\"noopener\" data-start=\"5739\" data-end=\"5831\">https:\/\/boletimsec.com\/vulnerabilidade-em-plugin-so-wordpress-coloca-800-mil-sites-em-risco\/<\/a><\/li>\n<li data-section-id=\"1xw46dh\" data-start=\"5835\" data-end=\"6141\"><strong>UAI \/ Mundo Corporativo.<\/strong> <em data-start=\"5863\" data-end=\"5929\">Falha em plugin do WordPress exp\u00f5e centenas de milhares de sites<\/em>.<br data-start=\"5930\" data-end=\"5933\" \/>Dispon\u00edvel em: <a class=\"decorated-link\" href=\"https:\/\/www.uai.com.br\/app\/noticia\/mundo-corporativo\/2026\/03\/19\/noticia-mundo-corporativo%2C379698\/falha-em-plugin-do-wordpress-expoe-400-mil-sites.shtml\" target=\"_blank\" rel=\"noopener\" data-start=\"5948\" data-end=\"6101\">https:\/\/www.uai.com.br\/app\/noticia\/mundo-corporativo\/2026\/03\/19\/noticia-mundo-corporativo%2C379698\/falha-em-plugin-do-wordpress-expoe-400-mil-sites.shtml<\/a><\/li>\n<\/ul>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Vulnerabilidade em plugin do WordPress: Quando 800 mil sites se tornam alvos potenciais O ecossistema do WordPress continua sendo um dos pilares da internet moderna, alimentando milh\u00f5es de sites corporativos, blogs e plataformas de e-commerce. No entanto, sua popularidade tamb\u00e9m o torna um alvo recorrente para cibercriminosos. Recentemente, uma vulnerabilidade cr\u00edtica em um plugin amplamente [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":24088,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21,105],"tags":[],"class_list":["post-24087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=24087"}],"version-history":[{"count":2,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24087\/revisions"}],"predecessor-version":[{"id":24090,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24087\/revisions\/24090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/24088"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=24087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=24087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=24087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}