{"id":7657,"date":"2018-08-24T06:10:33","date_gmt":"2018-08-24T06:10:33","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=1543"},"modified":"2025-07-09T07:11:24","modified_gmt":"2025-07-09T07:11:24","slug":"apache-struts-2-remote-code-execution-vulnerability","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apache-struts-2-remote-code-execution-vulnerability\/","title":{"rendered":"Apache Struts 2 Remote Code Execution Vulnerability"},"content":{"rendered":"<p><strong>Tag:\u00a0\u00a0<\/strong><\/p>\n<p>Apache Struts2, CVE-2018-11776, Remote Code Execution, S2-057<\/p>\n<p><strong>Severity\uff1aCritical<\/strong><\/p>\n<p>This vulnerability can lead to remote code execution. PoC has been made publicly available and may lead to significant, extensive impact.<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>On August 22, Apache disclosed a remote code execution (RCE) vulnerability that has been asigned the CVE number CVE-2018-11776. \u00a0This vulnerability could be triggered when:<\/p>\n<ul>\n<li>using results with no namespace and in same time, its upper action(s) have no or wildcard namespace. Or<\/li>\n<li>using url tag which doesn\u2019t have value and action set.<\/li>\n<\/ul>\n<p>Reference link: <a href=\"https:\/\/cwiki.apache.org\/confluence\/display\/WW\/S2-057\">https:\/\/cwiki.apache.org\/confluence\/display\/WW\/S2-057<\/a><\/p>\n<p><strong>NSFOCUS will release a detailed analysis and protection solution very soon. Stay tuned!<\/strong><\/p>\n<p><strong>Affected Versions<\/strong><\/p>\n<p>\uf06c\u00a0Struts 2.3 &#8211; 2.3.34<br \/>\n\uf06c\u00a0Struts 2.5 &#8211; 2.5.16<\/p>\n<p><strong>Unaffected Versions<\/strong><br \/>\n\uf06c\u00a0Struts 2.3.35<br \/>\n\uf06c\u00a0Struts 2.5.17<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>Apache has fixed this vulnerability in its new versions. Users are advised to upgrade to Apache Struts version 2.3.35 or 2.5.17.If you are a developers, you can upgrade and release their applications by configuring Maven or Gradle. Or you can download and use the new Struts frame.<\/p>\n<p>Maven<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"581\">&lt;!&#8211; https:\/\/mvnrepository.com\/artifact\/org.apache.struts\/struts2-core &#8211;&gt;<\/p>\n<p>&lt;dependency&gt;<\/p>\n<p>&lt;groupId&gt;org.apache.struts&lt;\/groupId&gt;<\/p>\n<p>&lt;artifactId&gt;struts2-core&lt;\/artifactId&gt;<\/p>\n<p>&lt;version&gt;<strong>2.5.17<\/strong>&lt;\/version&gt;<\/p>\n<p>&lt;\/dependency&gt;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Gradle<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"581\">\/\/ https:\/\/mvnrepository.com\/artifact\/org.apache.struts\/struts2-core<\/p>\n<p>compile group: &#8216;org.apache.struts&#8217;, name: &#8216;struts2-core&#8217;, version: &#8216;<strong>2.5.17<\/strong>&#8216;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Download<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"149\">Struts2.3.35<\/td>\n<td width=\"432\">http:\/\/mirrors.hust.edu.cn\/apache\/struts\/2.3.35\/struts-2.3.35-all.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"149\">Struts2.5.17<\/td>\n<td width=\"432\">http:\/\/mirrors.hust.edu.cn\/apache\/struts\/2.5.17\/struts-2.5.17-all.zip<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Workaround<\/strong><\/p>\n<p>Check all Struts 2 configuration files such as struts.xml and\u00a0set namespace for all package nodes not defined yet.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"581\">&lt;package name=&#8221;user&#8221;<strong> namespace=&#8221;\/user&#8221; <\/strong>extends=&#8221;struts-default&#8221;&gt;<\/p>\n<p>&lt;action name=&#8221;login&#8221;&gt;<\/p>\n<p>&lt;\/action&gt;<\/p>\n<p>&lt;\/package&gt;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tag:\u00a0\u00a0 Apache Struts2, CVE-2018-11776, Remote Code Execution, S2-057 Severity\uff1aCritical This vulnerability can lead to remote code execution. PoC has been made publicly available and may lead to significant, extensive impact. Description On August 22, Apache disclosed a remote code execution (RCE) vulnerability that has been asigned the CVE number CVE-2018-11776. \u00a0This vulnerability could be triggered [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1617,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[],"class_list":["post-7657","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Tag:\u00a0\u00a0 Apache Struts2, CVE-2018-11776, Remote Code Execution, S2-057 Severity\uff1aCritical This vulnerability can lead to remote code execution. PoC has been\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-24T06:10:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-09T07:11:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Tag:\u00a0\u00a0 Apache Struts2, CVE-2018-11776, Remote Code Execution, S2-057 Severity\uff1aCritical This vulnerability can lead to remote code execution. PoC has been\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Apache Struts 2 Remote Code Execution Vulnerability\",\"datePublished\":\"2018-08-24T06:10:33+00:00\",\"dateModified\":\"2025-07-09T07:11:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/\"},\"wordCount\":302,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/thumb-small.png\",\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/\",\"name\":\"Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/thumb-small.png\",\"datePublished\":\"2018-08-24T06:10:33+00:00\",\"dateModified\":\"2025-07-09T07:11:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/thumb-small.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/thumb-small.png\",\"width\":125,\"height\":165,\"caption\":\"NSFOCUS DDoS Protection Solution informational document.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts-2-remote-code-execution-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apache Struts 2 Remote Code Execution Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/","og_locale":"pt_BR","og_type":"article","og_title":"Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS","og_description":"Tag:\u00a0\u00a0 Apache Struts2, CVE-2018-11776, Remote Code Execution, S2-057 Severity\uff1aCritical This vulnerability can lead to remote code execution. PoC has been","og_url":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/","og_site_name":"NSFOCUS","article_published_time":"2018-08-24T06:10:33+00:00","article_modified_time":"2025-07-09T07:11:24+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS","twitter_description":"Tag:\u00a0\u00a0 Apache Struts2, CVE-2018-11776, Remote Code Execution, S2-057 Severity\uff1aCritical This vulnerability can lead to remote code execution. PoC has been","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Apache Struts 2 Remote Code Execution Vulnerability","datePublished":"2018-08-24T06:10:33+00:00","dateModified":"2025-07-09T07:11:24+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/"},"wordCount":302,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png","articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/","url":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/","name":"Apache Struts 2 Remote Code Execution Vulnerability - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png","datePublished":"2018-08-24T06:10:33+00:00","dateModified":"2025-07-09T07:11:24+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/thumb-small.png","width":125,"height":165,"caption":"NSFOCUS DDoS Protection Solution informational document."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apache-struts-2-remote-code-execution-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Apache Struts 2 Remote Code Execution Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=7657"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7657\/revisions"}],"predecessor-version":[{"id":32630,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7657\/revisions\/32630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/1617"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=7657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=7657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=7657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}