{"id":2448,"date":"2026-04-15T07:35:06","date_gmt":"2026-04-15T14:35:06","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2448"},"modified":"2026-04-15T07:50:00","modified_gmt":"2026-04-15T14:50:00","slug":"emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/","title":{"rendered":"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"650\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-1280x650.png\" alt=\"\" class=\"wp-image-2449\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-1280x650.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-512x260.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-768x390.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-1536x780.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-2048x1040.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\"><em>Sample of assets impacted by React DoS vulnerability, identified by the CyCognito Platform<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-23869?<\/h2>\n\n\n\n<p>CVE-2026-23869 is a denial of service vulnerability in React Server Components, caused by improper handling of cyclic data structures during deserialization of incoming HTTP requests. The vulnerability resides in the React Flight protocol&#8217;s server-side reply handling, specifically in the <code>createMap<\/code>, <code>createSet<\/code>, and <code>extractIterator<\/code> functions within <code>ReactFlightReplyServer.js<\/code>.<\/p>\n\n\n\n<p>The vulnerability carries a CVSS v3.1 base score of 7.5 (High). Exploitation requires no authentication and no user interaction. An attacker with network access to a Server Function endpoint can trigger the condition by sending a specially crafted HTTP request containing a cyclic <code>model<\/code> payload.<\/p>\n\n\n\n<p>When such a request is processed, the server enters an excessive CPU consumption loop lasting up to approximately one minute before throwing a catchable error. Repeated requests can sustain the condition, degrading or denying service to legitimate users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-23869?<\/h2>\n\n\n\n<p>The vulnerability affects versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4 of the following packages: <code>react-server-dom-webpack<\/code>, <code>react-server-dom-parcel<\/code>, and <code>react-server-dom-turbopack<\/code>. Downstream frameworks that bundle these packages are also affected, including Next.js 13.x, 14.x, 15.x, and 16.x when the App Router is in use.<\/p>\n\n\n\n<p>In practice, affected assets are web applications and services built with React Server Components exposed on public-facing infrastructure. These include customer portals, SaaS dashboards, e-commerce frontends, and internal tooling deployed to cloud environments. The asset surface is large because Next.js is one of the most widely adopted React frameworks, and App Router adoption has grown substantially since its stable release.<\/p>\n\n\n\n<p>Assets are particularly prone to internet exposure in this case because Next.js applications are frequently deployed to CDN-backed edge platforms, cloud-native hosting services, and containerized environments where server-side endpoints are reachable without explicit firewall controls. Applications that do not run server-side React code, or that use frameworks not supporting React Server Components, are not affected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1184\" height=\"734\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-147.png\" alt=\"\" class=\"wp-image-2450\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-147.png 1184w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-147-512x317.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-147-768x476.png 768w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\" \/><\/figure>\n\n\n\n<p>Exposure in this set is led by Industrials at 24.4% of observed assets, with Communication Services contributing 16.7%.<\/p>\n\n\n\n<p>Industrials overrepresentation reflects the sector&#8217;s broad adoption of modern web frameworks for customer-facing interfaces: dealer portals, logistics dashboards, procurement platforms, and field service tools. <\/p>\n\n\n\n<p>These applications are frequently maintained by distributed teams, sourced from third-party vendors, or inherited through acquisitions, which increases the likelihood that framework upgrades lag behind patch availability.<\/p>\n\n\n\n<p>The cross-sector distribution points to a common underlying condition: Next.js and its dependencies are embedded deeply in the web application stacks of large enterprises across nearly every vertical. <\/p>\n\n\n\n<p>The 44.9% pooled into Others reflects how broadly this exposure reaches beyond any single industry, suggesting that organizations cannot rely on sector-level risk heuristics to prioritize remediation. Asset-level visibility is the more reliable lens.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Patches are available. Fixed versions of the upstream React packages are 19.0.5, 19.1.6, and 19.2.5. For Next.js, Vercel has backported fixes across affected release lines; users should upgrade to the latest patched version in their release line as published in the Vercel changelog for this CVE.<\/p>\n\n\n\n<p>Red Hat has noted that no practical mitigation exists outside of upgrading the affected package, and has marked <code>rhoai\/odh-dashboard-rhel9<\/code> as affected within Red Hat OpenShift AI. Organizations running Red Hat products that bundle these components should verify fix availability directly with Red Hat&#8217;s Security Advisory portal.<\/p>\n\n\n\n<p>Defenders should not assume a patched version is in production simply because one exists. Confirming the deployed version against the fixed version range requires direct verification with the relevant vendor, hosting provider, or through dependency scanning of the running application.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Until patches are confirmed in place, defenders should implement rate limiting on Server Function endpoints at the reverse proxy or load balancer level, and configure request timeouts to terminate long-running requests before full CPU exhaustion occurs. <\/p>\n\n\n\n<p>Monitoring for sustained CPU spikes on React application servers, combined with alerting on anomalous POST request patterns to RSC endpoints, can help identify active exploitation attempts. <\/p>\n\n\n\n<p>Organizations should also audit which public-facing applications use the App Router and prioritize those with the highest external exposure for immediate upgrade.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-23869 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A denial of service vulnerability in React Server Components allows an unauthenticated remote attacker to send a specially crafted HTTP request that triggers excessive CPU consumption.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2448","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"A denial of service vulnerability in React Server Components allows an unauthenticated remote attacker to send a specially crafted HTTP request that triggers excessive CPU consumption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T14:35:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T14:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2674\" \/>\n\t<meta property=\"og:image:height\" content=\"1358\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service\",\"datePublished\":\"2026-04-15T14:35:06+00:00\",\"dateModified\":\"2026-04-15T14:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/\"},\"wordCount\":728,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-1280x650.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/\",\"name\":\"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-1280x650.png\",\"datePublished\":\"2026-04-15T14:35:06+00:00\",\"dateModified\":\"2026-04-15T14:50:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869.png\",\"width\":2674,\"height\":1358},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service | CyCognito Blog","og_description":"A denial of service vulnerability in React Server Components allows an unauthenticated remote attacker to send a specially crafted HTTP request that triggers excessive CPU consumption.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/","og_site_name":"CyCognito Blog","article_published_time":"2026-04-15T14:35:06+00:00","article_modified_time":"2026-04-15T14:50:00+00:00","og_image":[{"width":2674,"height":1358,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service","datePublished":"2026-04-15T14:35:06+00:00","dateModified":"2026-04-15T14:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/"},"wordCount":728,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-1280x650.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/","name":"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869-1280x650.png","datePublished":"2026-04-15T14:35:06+00:00","dateModified":"2026-04-15T14:50:00+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-23869.png","width":2674,"height":1358},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-23869-react-server-components-denial-of-service-via-cyclic-deserialization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-23869) React Server Components Denial of Service"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2448"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2448\/revisions"}],"predecessor-version":[{"id":2454,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2448\/revisions\/2454"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}