{"id":1499,"date":"2025-04-28T14:14:30","date_gmt":"2025-04-28T21:14:30","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1499"},"modified":"2025-05-20T07:15:47","modified_gmt":"2025-05-20T14:15:47","slug":"emerging-threat-sap-netweaver-visual-composer-cve-2025-31324","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/","title":{"rendered":"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324"},"content":{"rendered":"\n<div class=\"draft\" style=\"padding: 10px 20px 1px 20px; margin: 10px 0px 30px 0px;\"><h6>Update <span class=\"light\"> May 19th 2025<\/span><\/h6><p>On May 13th, a new vulnerability, CVE-2025-42999, was published. While this vulnerability requires privileged access to exploit, it takes advantage of the same core vulnerability as CVE-2025-31324. In response, SAP released a new patch for CVE-2025-42999 (available at SAP Security Note 3604119 with SAP login) that also fixes the underlying deserialization issue exploited in CVE-2025-31324. <\/p>\n<p>Applying this patch protects against both vulnerabilities and should be applied even if earlier fixes, like previous mitigation steps suggested for CVE-2025-31324, were implemented in order to eliminate residual risk.<\/p><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2025-31324?&nbsp;<\/h2>\n\n\n\n<p>On April 24th, 2025, SAP disclosed CVE-2025-31324, a critical missing authorization check vulnerability (CVSS 10.0) affecting the Metadata Uploader component of SAP NetWeaver Visual Composer. This vulnerability fails to restrict file upload content, allowing unauthenticated remote attackers to achieve full remote code execution (RCE) on affected servers.&nbsp;<\/p>\n\n\n\n<p>SAP Netweaver is a technology integration platform for enterprise applications. It presents a tempting target for attackers because it\u2019s widely deployed across government agencies, giving successful attackers access to valuable information and access to attractive government networks. SAP solutions are also frequently deployed on-premises, giving users control over when and which security updates are applied.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2025-31324?&nbsp;<\/h2>\n\n\n\n<p>CVE-2025-31324 affects SAP NetWeaver Visual Composer: VC FRAMEWORK 7.50.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?&nbsp;<\/h2>\n\n\n\n<p>A security patch was released by SAP on April 24th, 2025. Customers should apply the patch as soon as possible. However, details on this patch are only available through SAP Note<a href=\"https:\/\/me.sap.com\/notes\/3594142\"> #3594142<\/a>, which can only be viewed by SAP customers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>CVE-2025-31324 was identified after SAP\u2019s April 2025 security patch day, so SAP users will need to apply an additional patch to be protected from this vulnerability.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?&nbsp;<\/h2>\n\n\n\n<p>If patching is not possible, there are several available mitigation options:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Disable the Visual Composer feature if it is not actively used.<\/strong> While users may still be using this feature to create user interfaces for applications, it has been deprecated since 2015 and is no longer receiving updates.<\/li>\n\n\n\n<li><strong>Restrict access to the \/developmentserver\/metadatauploader endpoint<\/strong> using network or firewall rules to prevent unauthenticated uploads. The exploit&#8217;s initial POST request targets this URL. Limiting access to it can help prevent a successful attack.<\/li>\n\n\n\n<li><strong>Monitor for indicators of compromise. <\/strong>Forward logs to SIEM and check for suspicious files by checking the path \u201cj2ee\/cluster\/apps\/sapcom\/irj\/servlet_jsp\/irj\/root\/\u201d. Unauthorized files might signal malicious webshell activity or exploitation. To ensure complete mitigation and prevent continued attacker access, these files must be removed. They could remain active even after other security measures are applied.<\/li>\n<\/ul>\n\n\n\n<p>Reliaquest also recommended performing a deep environment scan to identify and remove suspect files before applying the patch.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is CVE-2025-31324 being actively exploited?&nbsp;<\/h2>\n\n\n\n<p>Reliaquest\u2019s analysis indicates that attackers are already exploiting this vulnerability in the wild and <a href=\"https:\/\/onapsis.com\/blog\/active-exploitation-of-sap-vulnerability-cve-2025-31324\/\">Onapsis<\/a> has also published a report claiming active exploitation. SAP has <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks\/\">disputed<\/a> this allegation.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there Indicators of Compromise (IoCs) for CVE-2025-31324?&nbsp;<\/h2>\n\n\n\n<p>Reliaquest\u2019s original reporting contained two IoCs, which can be found <a href=\"https:\/\/reliaquest.com\/blog\/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise\/\">here<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is CyCognito helping customers identify assets vulnerable to CVE-2025-31324?&nbsp;<\/h2>\n\n\n\n<p>CyCognito has deployed multiple tests to identify this vulnerability in customer assets. Customers can also access lists of affected assets running SAP NetWeaver, to assess exposure and validate patches were successful.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"756\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-1280x756.webp\" alt=\"\" class=\"wp-image-1501\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-1280x756.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-512x303.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-768x454.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-1536x908.webp 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1.webp 1946w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 1: The alert sent by CyCognito for CVE-2025-31324<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?&nbsp;<\/h2>\n\n\n\n<p>The CyCognito platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Check out our website and explore our platform with a self-guided, interactive <a href=\"https:\/\/app.getreprise.com\/launch\/V6Waa5X\">dashboard product tour<\/a>. To learn more about how CyCognito can help you identify and remediate emerging threats to your attack surface, request a <a href=\"https:\/\/www.cycognito.com\/demo\/\">customized demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On April 24, 2025, SAP disclosed CVE-2025-31324, a critical vulnerability (CVSS 10.0) in the Metadata Uploader of SAP NetWeaver Visual Composer 7.50, which is actively exploited. SAP released a patch, with details limited to customers, alongside other mitigation options. CyCognito has deployed detection tests and provides customers with asset lists to assess and validate remediation efforts. <\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[58,200,201,238,57],"class_list":["post-1499","post","type-post","status-publish","format-standard","hentry","category-research","tag-cve","tag-rce","tag-remote-code-execution","tag-sap","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324 | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"SAP CVE-2025-31324 (CVSS 10.0) exploited; patch issued. CyCognito offers detection tests and asset lists to verify fixes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324\" \/>\n<meta property=\"og:description\" content=\"SAP CVE-2025-31324 (CVSS 10.0) exploited; patch issued. CyCognito offers detection tests and asset lists to verify fixes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-28T21:14:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-20T14:15:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-04-28-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emma Zaballos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Zaballos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/\"},\"author\":{\"name\":\"Emma Zaballos\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\"},\"headline\":\"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324\",\"datePublished\":\"2025-04-28T21:14:30+00:00\",\"dateModified\":\"2025-05-20T14:15:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-1280x756.webp\",\"keywords\":[\"CVE\",\"RCE\",\"Remote Code Execution\",\"SAP\",\"Vulnerability\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/\",\"name\":\"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324 | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-1280x756.webp\",\"datePublished\":\"2025-04-28T21:14:30+00:00\",\"dateModified\":\"2025-05-20T14:15:47+00:00\",\"description\":\"SAP CVE-2025-31324 (CVSS 10.0) exploited; patch issued. CyCognito offers detection tests and asset lists to verify fixes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1.webp\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1.webp\",\"width\":1946,\"height\":1150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\",\"name\":\"Emma Zaballos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"caption\":\"Emma Zaballos\"},\"description\":\"Product Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324 | CyCognito Blog","description":"SAP CVE-2025-31324 (CVSS 10.0) exploited; patch issued. CyCognito offers detection tests and asset lists to verify fixes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324","og_description":"SAP CVE-2025-31324 (CVSS 10.0) exploited; patch issued. CyCognito offers detection tests and asset lists to verify fixes.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/","og_site_name":"CyCognito Blog","article_published_time":"2025-04-28T21:14:30+00:00","article_modified_time":"2025-05-20T14:15:47+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-04-28-2400x1256-email.png","type":"image\/png"}],"author":"Emma Zaballos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emma Zaballos","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/"},"author":{"name":"Emma Zaballos","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58"},"headline":"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324","datePublished":"2025-04-28T21:14:30+00:00","dateModified":"2025-05-20T14:15:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/"},"wordCount":653,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-1280x756.webp","keywords":["CVE","RCE","Remote Code Execution","SAP","Vulnerability"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/","name":"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324 | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1-1280x756.webp","datePublished":"2025-04-28T21:14:30+00:00","dateModified":"2025-05-20T14:15:47+00:00","description":"SAP CVE-2025-31324 (CVSS 10.0) exploited; patch issued. CyCognito offers detection tests and asset lists to verify fixes.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1.webp","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/SAP-Netweaver-Fig-1.webp","width":1946,"height":1150},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58","name":"Emma Zaballos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","caption":"Emma Zaballos"},"description":"Product Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1499"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1499\/revisions"}],"predecessor-version":[{"id":1555,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1499\/revisions\/1555"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}