{"id":2056,"date":"2026-01-14T01:54:58","date_gmt":"2026-01-14T09:54:58","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2056"},"modified":"2026-01-14T01:54:59","modified_gmt":"2026-01-14T09:54:59","slug":"emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/","title":{"rendered":"Emerging Threat: CVE-2026-21858, CVE-2025-68613 &#038; CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities"},"content":{"rendered":"\n<p>Published: January 12, 2026<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are CVE-2026-21858, CVE-2025-68613 &amp; CVE-2026-21877?<\/h2>\n\n\n\n<p>These three high-severity vulnerabilities affect <strong>n8n<\/strong>, a popular open-source workflow automation platform used to integrate services and automate operational tasks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CVE-2026-21858 (Ni8mare)<\/strong> is a critical unauthenticated remote code execution (RCE) vulnerability caused by improper handling of webhook request parsing. An attacker can exploit this flaw without credentials to gain full control of a vulnerable n8n instance.<\/li>\n\n\n\n<li><strong>CVE-2025-68613<\/strong> is a critical authenticated RCE vulnerability in n8n\u2019s expression evaluation engine. An authenticated user with permission to create or modify workflows can inject malicious expressions that result in arbitrary code execution.<\/li>\n\n\n\n<li><strong>CVE-2026-21877<\/strong> is a critical authenticated RCE vulnerability that allows a legitimate user to execute arbitrary code by abusing unsafe workflow execution paths.<\/li>\n<\/ul>\n\n\n\n<p>Together, these issues expose weaknesses in request handling, expression evaluation, and authenticated workflow execution within n8n.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by these CVEs?<\/h2>\n\n\n\n<p>All three vulnerabilities affect <strong>self-hosted and cloud-hosted n8n instances<\/strong> running vulnerable versions.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CVE-2026-21858<\/strong> affects n8n versions prior to <strong>1.121.0<\/strong>, where externally exposed webhook endpoints can be abused without authentication.<\/li>\n\n\n\n<li><strong>CVE-2025-68613<\/strong> affects n8n instances up to the patched releases <strong>1.120.4<\/strong>, <strong>1.121.1<\/strong>, and <strong>1.122.0<\/strong>, enabling authenticated users to execute arbitrary code.<\/li>\n\n\n\n<li><strong>CVE-2026-21877<\/strong> affects n8n versions <strong>0.123.0 through 1.121.2<\/strong>, allowing authenticated remote code execution through unsafe workflow execution behavior.<\/li>\n<\/ul>\n\n\n\n<p>Assets at higher risk include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internet-facing n8n instances<\/li>\n\n\n\n<li>Environments exposing webhook endpoints<\/li>\n\n\n\n<li>Automation servers with access to internal systems or credentials<\/li>\n\n\n\n<li>Deployments where multiple users can create or edit workflows<\/li>\n<\/ul>\n\n\n\n<p>Because n8n often orchestrates sensitive API keys and internal integrations, a compromised instance can lead to broader infrastructure exposure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Yes. Fixes are available for all three vulnerabilities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CVE-2026-21858<\/strong> \u2013 Upgrade to <strong>n8n 1.121.0 or later<\/strong><\/li>\n\n\n\n<li><strong>CVE-2025-68613<\/strong> \u2013 Upgrade to <strong>n8n 1.120.4<\/strong>, <strong>1.121.1<\/strong>, <strong>1.122.0<\/strong>, or later<\/li>\n\n\n\n<li><strong>CVE-2026-21877<\/strong> \u2013 Upgrade to <strong>n8n 1.121.3 or later<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Upgrading to patched versions is the only reliable way to fully address these issues. Configuration changes alone do not eliminate the underlying risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>In addition to patching, organizations should:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify and inventory all n8n instances, including test and legacy deployments<\/li>\n\n\n\n<li>Restrict external exposure of webhook endpoints where possible<\/li>\n\n\n\n<li>Limit workflow creation and editing permissions to trusted users<\/li>\n\n\n\n<li>Monitor workflow execution and webhook activity for anomalies<\/li>\n\n\n\n<li>Restrict access to administrative interfaces using network controls<\/li>\n\n\n\n<li>Apply defense-in-depth controls such as WAFs and API gateways<\/li>\n<\/ul>\n\n\n\n<p>These actions help reduce risk while remediation efforts are underway.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is CVE-2026-21858, CVE-2025-68613 or CVE-2026-21877 being actively exploited?<\/h2>\n\n\n\n<p>As of the latest advisories, there are no confirmed large-scale exploitation campaigns targeting these vulnerabilities. However, proof-of-concept techniques and technical analyses have been published, and attackers are actively scanning for exposed n8n instances.<\/p>\n\n\n\n<p>Given the severity of these issues\u2014particularly the unauthenticated RCE in CVE-2026-21858\u2014organizations should treat exploitation as likely and act with urgency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is CyCognito helping customers identify assets vulnerable to these CVEs?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory covering these n8n vulnerabilities inside the CyCognito platform on <strong>January 12th, 2026<\/strong>, and is actively researching enhanced detection capabilities for this vulnerability cluster. The platform already surfaces externally exposed assets tied to n8n workflows, webhook endpoints, and automation servers.<\/p>\n\n\n\n<p>CyCognito advises customers to review systems running n8n or similar automation tooling to assess potential exposure, even if those systems are not explicitly identified as running vulnerable versions. Automation platforms are frequently deployed outside central inventories, making external discovery critical.<\/p>\n\n\n\n<p>Check out CyCognito\u2019s <strong><a href=\"https:\/\/www.cycognito.com\/emerging-threats\/\">Emerging Threats<\/a><\/strong> page for more information on these and other relevant vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito gives security teams a clear view of every external asset, including systems they may not know exist. That visibility makes it easier to find n8n instances and understand which ones are vulnerable and exposed. Instead of working through large, noisy alert lists, teams can focus on systems that matter most based on business impact and real-world exploit paths.<\/p>\n\n\n\n<p>CyCognito also helps verify that fixes are deployed and continues monitoring for changes, ensuring newly exposed systems don\u2019t slip by unnoticed. This enables organizations to move faster, reduce risk with confidence, and stay ahead of attackers.<\/p>\n\n\n\n<p>To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our <strong><a href=\"https:\/\/www.cycognito.com\/demo\/\">Contact Us<\/a><\/strong> page to schedule a demo.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2026-21858, CVE-2025-68613, and CVE-2026-21877 expose critical remote code execution risks in n8n workflow automation. This blog outlines affected assets, available fixes, exploitation status, and recommended actions, and explains how CyCognito helps organizations identify exposed instances and reduce external risk effectively.<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2056","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: CVE-2026-21858, CVE-2025-68613 &amp; CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: CVE-2026-21858, CVE-2025-68613 &amp; CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"CVE-2026-21858, CVE-2025-68613, and CVE-2026-21877 expose critical remote code execution risks in n8n workflow automation. This blog outlines affected assets, available fixes, exploitation status, and recommended actions, and explains how CyCognito helps organizations identify exposed instances and reduce external risk effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-14T09:54:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-14T09:54:59+00:00\" \/>\n<meta name=\"author\" content=\"Amit Sheps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amit Sheps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/\"},\"author\":{\"name\":\"Amit Sheps\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984\"},\"headline\":\"Emerging Threat: CVE-2026-21858, CVE-2025-68613 &#038; CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities\",\"datePublished\":\"2026-01-14T09:54:58+00:00\",\"dateModified\":\"2026-01-14T09:54:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/\",\"name\":\"Emerging Threat: CVE-2026-21858, CVE-2025-68613 & CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2026-01-14T09:54:58+00:00\",\"dateModified\":\"2026-01-14T09:54:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: CVE-2026-21858, CVE-2025-68613 &#038; CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984\",\"name\":\"Amit Sheps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g\",\"caption\":\"Amit Sheps\"},\"description\":\"Head of Product Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/amit-sheps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: CVE-2026-21858, CVE-2025-68613 & CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: CVE-2026-21858, CVE-2025-68613 & CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities | CyCognito Blog","og_description":"CVE-2026-21858, CVE-2025-68613, and CVE-2026-21877 expose critical remote code execution risks in n8n workflow automation. This blog outlines affected assets, available fixes, exploitation status, and recommended actions, and explains how CyCognito helps organizations identify exposed instances and reduce external risk effectively.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/","og_site_name":"CyCognito Blog","article_published_time":"2026-01-14T09:54:58+00:00","article_modified_time":"2026-01-14T09:54:59+00:00","author":"Amit Sheps","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amit Sheps","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/"},"author":{"name":"Amit Sheps","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984"},"headline":"Emerging Threat: CVE-2026-21858, CVE-2025-68613 &#038; CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities","datePublished":"2026-01-14T09:54:58+00:00","dateModified":"2026-01-14T09:54:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/"},"wordCount":730,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/","name":"Emerging Threat: CVE-2026-21858, CVE-2025-68613 & CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2026-01-14T09:54:58+00:00","dateModified":"2026-01-14T09:54:59+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: CVE-2026-21858, CVE-2025-68613 &#038; CVE-2026-21877 \u2013 n8n Workflow Automation Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984","name":"Amit Sheps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g","caption":"Amit Sheps"},"description":"Head of Product Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/amit-sheps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2056"}],"version-history":[{"count":2,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2056\/revisions"}],"predecessor-version":[{"id":2058,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2056\/revisions\/2058"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}