{"id":1990,"date":"2021-06-03T14:02:45","date_gmt":"2021-06-03T18:02:45","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1990"},"modified":"2021-06-03T14:02:47","modified_gmt":"2021-06-03T18:02:47","slug":"flaws-in-pdf-document-apps-allow-alterations","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/","title":{"rendered":"Flaws in PDF Document Apps Allow Alterations"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-a-research-team-found-vulnerabilities-in-pdf-document-apps-which-would-allow-hackers-to-manipulate-its-content\">A research team found vulnerabilities in PDF document apps which would allow hackers to manipulate its content. <\/h2>\n\n\n\n<p>Security flaws in applications are nothing new. Some flaws are easier to exploit than others, and some are more detrimental if exploited than others. But one thing remains the same: All of them are a problem. No matter where the flaw is, if it\u2019s happening in anything your business uses, it\u2019s a problem. A research team out of Ruhr-University Bochum in Germany discovered security flaws in PDF document apps that could allow a bad actor to manipulate certified documents.<\/p>\n\n\n\n<p>The researchers presented <a href=\"https:\/\/web-in-security.blogspot.com\/2021\/05\/attacks-on-pdf-certification.html\" target=\"_blank\" rel=\"noreferrer noopener\">their findings<\/a> at this year\u2019s <a href=\"https:\/\/www.ieee-security.org\/TC\/SP2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">IEEE Symposium on Security and Privacy<\/a>.&nbsp; The symposium, all-virtual due to COVID-19 restrictions, is an annual event that \u201chas been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.&#8221; The 2021 Symposium will mark the 42nd annual meeting of this flagship conference. There are two specific attacks are outlined on their blog, which names them Sneaky Signature Attack (SSA) and the Evil Annotation Attack (EAA). Both exploits manipulate the PDF certification process via flaws in the file\u2019s specification, which is the guarantee that the document is from a trustworthy source.<\/p>\n\n\n\n<p>From here, bad actors can get inside the certification process. Hackers can then alter the document\u2019s visible content without raising any red flags. \u201cThe attack idea exploits the flexibility of PDF certification,\u201d <a href=\"https:\/\/gizmodo.com\/security-flaws-could-allow-hackers-to-change-certified-1846983967\" target=\"_blank\" rel=\"noreferrer noopener\">the team says<\/a>. \u201cOur practical evaluation shows that an attacker could change the visible content in 15 of 26 viewer applications by using EAA and in 8 applications using SSA by using PDF specification compliant exploits.\u201d<\/p>\n\n\n\n<p>Patches for these flaws already exist, so if your business is using PDF documents, it\u2019s important to ensure the applications are updated. One may question why a hacker would go through this process to modify a contract, but let\u2019s also ask why do criminals do anything? They don\u2019t need a reason, and if they are getting into your sensitive documents, what else are they getting into? Exploiting a flaw in a PDF document could give a threat actor that one sliver of access they needed. How can they use that to manipulate systems or people to escalate further access?<\/p>\n\n\n\n<p>Manipulation of corporate contracts may not seem like a valuable target, but sometimes all it takes is one disgruntled person to take drastic measures, and all they care about is causing problems for a business. Not to mention that sensitive information is contained within these documents, and potentially legitimate (not electronic) signatures.<\/p>\n\n\n\n<p>These flaws, while seemingly a miniscule problem on the surface, highlight just how integrated security has to be in everything you do. Business leaders must pay attention to their security and ensure that security has layers. Every system you run, every storage method and application you use should be secured as tightly as possible. This means that even when a flaw is found that is unlikely to be exploited, you still fix that flaw. You don\u2019t want to be the business that got hacked through a PDF.<\/p>\n\n\n\n<p>As always, if you\u2019re uncertain, don\u2019t have time or even if you think you know what you\u2019re doing, it\u2019s always smart to bring in an expert to review your security information and processes. Even if you trust your team to be thorough, they will usually miss something simply because their eyes are used to seeing it. A third-party review is always a good idea.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A German research team found flaws in PDF apps which allow hackers to alter its contents. It could be the sliver of access a bad actor needs.<\/p>\n","protected":false},"author":1,"featured_media":2007,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,1969,2073],"tags":[1169,1943,36,1910,31,2097,2333,571,1997],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Flaws in PDF Document Apps Allow Alterations - PWV Consultants<\/title>\n<meta name=\"description\" content=\"A German research team found flaws in PDF document apps which allow hackers to alter its contents. It could be the sliver of access a bad actor needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flaws in PDF Document Apps Allow Alterations\" \/>\n<meta property=\"og:description\" content=\"A German research team found flaws in PDF apps which allow hackers to alter its contents. It could be the sliver of access a bad actor needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-03T18:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-03T18:02:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Flaws in PDF Document Apps Allow Alterations\",\"datePublished\":\"2021-06-03T18:02:45+00:00\",\"dateModified\":\"2021-06-03T18:02:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg\",\"keywords\":[\"Application Security\",\"AppSec\",\"Business\",\"CyberSec\",\"Cybersecurity\",\"flaws\",\"PDF\",\"technology\",\"vulnerability\"],\"articleSection\":[\"Application Security\",\"Business\",\"Vulnerability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/\",\"name\":\"Flaws in PDF Document Apps Allow Alterations - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg\",\"datePublished\":\"2021-06-03T18:02:45+00:00\",\"dateModified\":\"2021-06-03T18:02:47+00:00\",\"description\":\"A German research team found flaws in PDF document apps which allow hackers to alter its contents. It could be the sliver of access a bad actor needs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flaws in PDF Document Apps Allow Alterations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Flaws in PDF Document Apps Allow Alterations - PWV Consultants","description":"A German research team found flaws in PDF document apps which allow hackers to alter its contents. It could be the sliver of access a bad actor needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/","og_locale":"en_US","og_type":"article","og_title":"Flaws in PDF Document Apps Allow Alterations","og_description":"A German research team found flaws in PDF apps which allow hackers to alter its contents. It could be the sliver of access a bad actor needs.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-06-03T18:02:45+00:00","article_modified_time":"2021-06-03T18:02:47+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Flaws in PDF Document Apps Allow Alterations","datePublished":"2021-06-03T18:02:45+00:00","dateModified":"2021-06-03T18:02:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/"},"wordCount":594,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg","keywords":["Application Security","AppSec","Business","CyberSec","Cybersecurity","flaws","PDF","technology","vulnerability"],"articleSection":["Application Security","Business","Vulnerability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/","url":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/","name":"Flaws in PDF Document Apps Allow Alterations - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg","datePublished":"2021-06-03T18:02:45+00:00","dateModified":"2021-06-03T18:02:47+00:00","description":"A German research team found flaws in PDF document apps which allow hackers to alter its contents. It could be the sliver of access a bad actor needs.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/PDF-Doc-Security-Flaws-scaled.jpeg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/flaws-in-pdf-document-apps-allow-alterations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Flaws in PDF Document Apps Allow Alterations"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1990"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1990"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1990\/revisions"}],"predecessor-version":[{"id":2008,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1990\/revisions\/2008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2007"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}