{"id":10744,"date":"2024-04-29T10:56:41","date_gmt":"2024-04-29T10:56:41","guid":{"rendered":"https:\/\/hostvento.com\/kb\/web-hosting\/getting-started-guide\/shared-hosting-quick-start-guide\/best-techniques-to-protect-your-wordpress-site-from-sql-injection-attacks\/"},"modified":"2024-06-14T07:58:36","modified_gmt":"2024-06-14T07:58:36","slug":"best-techniques-to-protect-your-wordpress-site-from-sql-injection-attacks","status":"publish","type":"docs","link":"https:\/\/www.hostvento.com\/kb\/docs\/hosting-faqs\/best-techniques-to-protect-your-wordpress-site-from-sql-injection-attacks\/","title":{"rendered":"Best Techniques to Protect Your WordPress Site from SQL Injection Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10744\" class=\"elementor elementor-10744\" data-elementor-post-type=\"docs\">\n\t\t\t\t<div class=\"elementor-element elementor-element-999b3b8 e-flex e-con-boxed e-con e-parent\" data-id=\"999b3b8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-315133bc elementor-widget elementor-widget-text-editor\" data-id=\"315133bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>One\u00a0of\u00a0the\u00a0most\u00a0widely\u00a0used\u00a0content\u00a0management\u00a0systems\u00a0for\u00a0website\u00a0development\u00a0is\u00a0WordPress. WordPress\u00a0is\u00a0the\u00a0greatest\u00a0platform\u00a0for\u00a0creating\u00a0websites\u00a0for\u00a0hobbies,\u00a0online\u00a0stores,\u00a0and\u00a0blogs.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>If you use WordPress, protecting the site from threats and hackers should be your first priority. But you should also be aware of the various methods hackers employ to steal your information, corrupt your databases, and more. SQL Injection is one of such.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Let us attempt to understand more about SQL injection and how to prevent it on your WordPress website in this guide.<br \/>All set? Now Let&#8217;s get started! We will start by learning about SQL injection.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>What is SQL Injection?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>An attack on websites or apps known as SQL injection, or structured query language, essentially allows an attacker to enter harmful statements into the online application in order to access the database. He has the ability to add, edit, and even remove data from the database.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>Try hostvento Secured\u00a0<a href=\"https:\/\/www.hostvento.com\/kb\/hosting\/wordpress-hosting\/\" target=\"_blank\" rel=\"noreferrer noopener\">WordPress Hosting<\/a>!<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Some of the popular database engine using SQL are:\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Oracle<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>MySQL<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>SQL Server<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Mongo DB<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>In the above list, MySQL stands in the second position in the list. This is because WordPress which uses SQL has contributed to around more than 35% of the internet. It has thereby become the target of hackers and identity thefts.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>How Does WordPress SQL Injection Work?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>SQL injection attacks work in different ways. This generally involves:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Unauthorized data retrieval:<\/strong>\u00a0Attackers can easily manipulate the SELECT query to grab data and \u201cdumb\u201d the contents in a database.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Modification of Data:<\/strong>\u00a0SQLi can be used for altering database entries or changing account permissions.\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Denial-of-Service (DoS):\u00a0<\/strong>DoS attacks make it difficult for users to visit a website. Attackers generally do this by removing the content in your database.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>You have a form on your website that collects information from visitors.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>On your website, if you ask a user for input, like the username, password, or phone number, instead they give you a malicious code SQL statement.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>From Where do the SQL Injection Attacks Come?<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>All the input fields are considered the common entry points for SQL injection attacks. To make it easy to understand, here we have mentioned the examples.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Login forms\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Signup forms\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Contact forms\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Shopping carts\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Feedback forms\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Site searches\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>How Common are WordPress SQL Injection Attacks?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>There are different reasons for SQL injection attacks, but here are some of the most common.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Most website databases are based on SQL<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>SQL injection scanning tools are available online\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Nearly all websites have at least one of the SQL injection entry points<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Websites have input fields to collect information from their visitors\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>It does not need any of the technical complexity to exploit<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>Ways for Preventing SQL Injection in WordPress<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Here are the different ways through which you can prevent SQL Injection in WordPress.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>1. Hide WordPress Version\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>It\u00a0is\u00a0advised\u00a0against\u00a0publicly\u00a0displaying\u00a0the\u00a0WordPress\u00a0version. If\u00a0you\u00a0provide\u00a0this\u00a0data\u00a0to\u00a0the\u00a0public,\u00a0attackers\u00a0will\u00a0find\u00a0it\u00a0easier\u00a0to\u00a0take\u00a0advantage\u00a0of\u00a0the\u00a0WordPress\u00a0version&#8217;s\u00a0vulnerabilities.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>To hide WordPress version, all you need to do is copy and paste the code into the\u00a0<strong>functions.php<\/strong>\u00a0file of the theme which is currently active. To do so, type the command given below:<br \/>remove_action(\u2018wp_head\u2019, \u2018wp_generator\u2019);<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>2. Remove the Unrequired Database Functionality\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>To prevent SQL injection attacks one of the most efficient techniques is removing unnecessary content and databases. Additionally, to prevent this, you can normalize the database and make your WordPress site better.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>3. Monitoring the SQL Statements\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>By keeping an eye on SQL statements exchanged amongst database-connected apps, you can find weaknesses in your WordPress website. It is possible to employ other programs in addition to the various kinds of monitoring tools available. Regardless of the solutions you choose, they might provide insightful information about possible database problems.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>4. Changing Your WordPress Database Prefix\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Each time you install WordPress, the CMS uses \u201cwp_\u201d as its database prefix. And this is why we recommended changing this to something else, as hackers use it for exploiting vulnerabilities via SQL injection. But before doing so, you should first back up your database. As if anything goes wrong, you have a safe version to restore.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Guessing the database tables becomes easy to exploit using SQL Injection techniques.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>5. Use Prepared Statements\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>One of the techniques to protect your site from WordPress SQL injection is making use of prepared statements.\u00a0<br \/>A prepared statement is basically a template of an SQL query where you can specify parameters at the next stage and then execute it.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Below is an example of a prepared statement in PHP and MySQL.<br \/>$query = $mysql_connection-&gt;prepare(&#8220;select * from user_table where username = ? and password = ?&#8221;);\u00a0<br \/>$query-&gt;execute(array($username, $password));<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>6. Make Use of Trusted Form Plugins<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>If you are running a business, a high-traffic site or even just a blog, the importance of forms like login forms, registration forms, contact forms, etc is very high. As there is a lot of form plugins available in the WordPress directory, it is difficult to find the right one.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>So, to keep your site safe from SQL injections attacks, make sure you install the right and trusted plugins. Also, you should make a note of the vulnerabilities that are discovered before and their resolution before choosing any plugin.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>7. Restrict the User Access Privileges\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>In WordPress, it is possible to assign different types of user roles. As an administrator, you can give authority to someone as an Author, Subscriber, Contributor, Administrator, or Super Admin. However, it is one of the best options to limit the number of users who have access to your website. As this can immensely help to reduce the chances of WordPress SQL injection attacks.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Perform the below steps to do so:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>In your WordPress dashboard, go to Users &gt; All Users. Here you can manage users and their roles. When you select the User, click on Edit.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Then, go to the Role Setting. Here you can easily limit the user\u2019s control on your WordPress site. Suppose, you assign someone as Administrator, you can consider downgrading them to an Editor, Author, or Contributor. This can help in removing potential vulnerabilities making your site secure.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>8. Perform Regular Updates\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>When you want to secure your website, consider using the latest software. Outdated software, themes and plugins can make your site prone to threats or vulnerable attacks.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>So, you need to keep checking for updates on your WordPress site. To do so, open your WordPress dashboard, and click on the Updates tab. Here, you can easily update your website to the newest version.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>9. WordPress Themes and Plugins\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Most of the vulnerabilities also including the SQL injection in WordPress were first discovered in the themes and plugins and not the WordPress core.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>So, keep a close eye on the fixes, and update accordingly. If the themes and plugins are not updated regularly, then it can be difficult and prone to vulnerabilities. Make a note you should always use a plugin that updates frequently.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4>10. Take Backups\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Backups are not related directly to SQL injection. But, it can help you to recover a site that\u2019s hacked. You can take the backups in two ways.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Local Backup:<\/strong>\u00a0It is a type of backup which is generated automatically or say manually and is located on your web hosting provider.\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Offsite Backup<\/strong>: The automated or manual backups will be generated and sent to the offsite storage location like Google Drive, Dropbox and more.\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>Keep Your WordPress Site Secured with hostvento<\/strong><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>hostvento offers secure and reliable &amp;\u00a0affordable WordPress hosting\u00a0for users, bloggers and businesses alike, so you can create a safe online experience. We offer the required security features like SSL certificate, free backups and more.\u00a0No matter which WordPress hosting plan you choose, hostvento offers the features you need to be safe against WordPress SQL Injection attacks.\u00a0<\/p>\n<p><a href=\"https:\/\/hostvento.com\/kb\/web-hosting\/getting-started-guide\/shared-hosting-quick-start-guide\/how-to-create-an-image-gallery-in-wordpress\/\" target=\"_blank\" rel=\"noopener\"><strong>Read Also:<\/strong>\u00a0 How to create an image gallery in WordPress<\/a><\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>One\u00a0of\u00a0the\u00a0most\u00a0widely\u00a0used\u00a0content\u00a0management\u00a0systems\u00a0for\u00a0website\u00a0development\u00a0is\u00a0WordPress. WordPress\u00a0is\u00a0the\u00a0greatest\u00a0platform\u00a0for\u00a0creating\u00a0websites\u00a0for\u00a0hobbies,\u00a0online\u00a0stores,\u00a0and\u00a0blogs. If you use WordPress, protecting the site from threats and hackers should be your first priority. But you should also be aware of the various methods hackers employ to steal your information, corrupt your databases, and more. SQL Injection is one of such. Let us attempt to understand more about SQL injection and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":23377,"menu_order":561,"comment_status":"closed","ping_status":"closed","template":"","doc_tag":[],"class_list":["post-10744","docs","type-docs","status-publish","hentry","no-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/docs\/10744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/comments?post=10744"}],"version-history":[{"count":5,"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/docs\/10744\/revisions"}],"predecessor-version":[{"id":20211,"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/docs\/10744\/revisions\/20211"}],"up":[{"embeddable":true,"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/docs\/23377"}],"wp:attachment":[{"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/media?parent=10744"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/www.hostvento.com\/kb\/wp-json\/wp\/v2\/doc_tag?post=10744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}