{"id":4828,"date":"2026-01-20T14:58:33","date_gmt":"2026-01-20T12:58:33","guid":{"rendered":"https:\/\/altanet.ro\/?p=4828"},"modified":"2026-04-14T14:10:58","modified_gmt":"2026-04-14T11:10:58","slug":"vulnerabilitati-api-securitate-aplicatii-furt-date","status":"publish","type":"post","link":"https:\/\/altanet.ro\/en\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/","title":{"rendered":"API Vulnerabilities: The \"Back Doors\" Through Which Your Applications Allow Hackers Access"},"content":{"rendered":"<p>We live in an interconnected world. Your online store automatically communicates with your bank for payments, your courier for deliveries, and your billing software. It all seems magical and fast. But have you ever wondered how these systems talk to each other?<\/p>\n<p class=\"translation-block\">They use digital \u201cpipes\u201d called <strong>APIs<\/strong> (Application Programming Interfaces). In 2026, <strong>API Vulnerabilities<\/strong> have become hackers\u2019 favorite way to steal data en masse, precisely because they are often left unattended. At <strong>Altanet Craiova<\/strong> we consider API security a zero priority for any business that develops or uses modern software.<\/p>\n<h2><span style=\"color: #0088cc;\"><strong>What is an API and why is it an easy target?<\/strong><\/span><\/h2>\n<p class=\"translation-block\">Think of an API as a <strong>waiter<\/strong> in a restaurant. You (the customer\/phone app) sit at the table and ask the waiter (API) for the menu or food. The waiter goes to the kitchen (server\/database), gets what you asked for, and brings it to you. You never go into the kitchen.<\/p>\n<p>The problem arises when the \"waiter\" is not trained to check who is ordering the food. Vulnerabilities arise when hackers ask the waiter for things they shouldn't receive, and the waiter obediently brings them.<\/p>\n<h3><strong>Examples of API attacks (BOLA)<\/strong><\/h3>\n<p class=\"translation-block\">The most common type of attack is called <strong>BOLA<\/strong> (Broken Object Level Authorization). Let's take a simple example:<\/p>\n<ul>\n<li>You are logged in to the courier application and want to see the status of your order with ID 1001.<\/li>\n<li class=\"translation-block\">The application sends an API request: <em>\u201cShow me the details of order 1001\u201d<\/em>.<\/li>\n<li class=\"translation-block\">The hacker intercepts the request and simply changes the number: <em>\u201cShow me the details of order 1002\u201d<\/em>, then 1003, 1004, etc.<\/li>\n<li class=\"translation-block\">If the API is vulnerable, it doesn't check whether the hacker <strong>has<\/strong> the right to see the 1002 command, it just delivers it. This way, the attacker can download the entire database of addresses and names without cracking any passwords.<\/li>\n<\/ul>\n<h2><strong>How do you secure your digital \"doors\"?<\/strong><\/h2>\n<p>API security is not solved with a simple antivirus, but through strict programming and monitoring rules:<\/p>\n<ul>\n<li class=\"translation-block\"><strong>Strict Authentication and Authorization:<\/strong> It is not enough for the user to be logged in. The API must check on each request: \"Does this user have the right to see EXACTLY this document?\".<\/li>\n<li class=\"translation-block\"><strong>Rate Limiting:<\/strong> If someone requests details of 1000 orders in a minute, it is clearly an attack. The system should automatically block these excessive requests.<\/li>\n<li class=\"translation-block\"><strong>Do not expose unnecessary data:<\/strong> Sometimes, the API sends the entire customer file (CNP, address, history) to the user's phone, even though the application only displays the name. Hackers can see this data hidden in the traffic. Send only the necessary information.<\/li>\n<\/ul>\n<p class=\"translation-block\">This topic is so critical that the global organization OWASP has a top dedicated exclusively to these risks. You can study the <a href=\"https:\/\/owasp.org\/API-Security\/editions\/2023\/en\/0x11-t10\/\" target=\"_blank\" rel=\"noopener\">OWASP API Security Top 10<\/a> for technical details.<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>APIs are the engine of digital transformation, but they can also be your Achilles heel. Don't leave windows open to your database. Test your applications before hackers do.<\/p>\n<p class=\"translation-block\">Do you have a mobile application or an online store and want an API penetration test? Our team offers security auditing and specialized <a href=\"https:\/\/altanet.ro\/en\/servicii-it\/\" target=\"_self\">IT services<\/a>. Visit our <a href=\"https:\/\/magazin.altanet.ro\/contact\" target=\"_self\">contact<\/a> page and make sure your data remains private.<\/p>\n<hr \/>\n<p class=\"translation-block\"><em>This material is part of Altanet's educational series on digital security. Want to know what other risks you are exposed to this year? See <a href=\"https:\/\/altanet.ro\/en\/2026\/01\/13\/lista-ameintari-cibernetice-2026-rezumat\/\" target=\"_self\">Complete list of cyber threats in 2026<\/a>.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>What are API Vulnerabilities? Learn how hackers can steal your database through your applications, without breaking the server.<\/p>","protected":false},"author":2,"featured_media":4831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[52,336,339,341,280,338,340,337],"class_list":["post-4828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securitate-cibernetica","tag-altanet-craiova","tag-api-security","tag-bola","tag-dezvoltare-web","tag-furt-date","tag-owasp-top-10","tag-securitate-aplicatii","tag-vulnerabilitati-api"],"featured_image_src":{"landsacpe":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-1140x445.jpg",1140,445,true],"list":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-463x348.jpg",463,348,true],"medium":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-300x164.jpg",300,164,true],"full":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg",2560,1396,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerabilitati API: Cum fura hackerii datele<\/title>\n<meta name=\"description\" content=\"Ce sunt Vulnerabilitatile API? Afla cum hackerii pot fura baza de date prin aplicatiile tale, fara sa sparga serverul.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/altanet.ro\/en\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilitati API: Cum fura hackerii datele\" \/>\n<meta property=\"og:description\" content=\"Ce sunt Vulnerabilitatile API? Afla cum hackerii pot fura baza de date prin aplicatiile tale, fara sa sparga serverul.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/altanet.ro\/en\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/\" \/>\n<meta property=\"og:site_name\" content=\"Altanet\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-20T12:58:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T11:10:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1396\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cristi Nefiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cristi Nefiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/\"},\"author\":{\"name\":\"Cristi Nefiru\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/#\\\/schema\\\/person\\\/c700a208fcd09d44b3b512626fac4be1\"},\"headline\":\"Vulnerabilitati API: &#8222;Usile din spate&#8221; prin care aplicatiile tale permit accesul hackerilor\",\"datePublished\":\"2026-01-20T12:58:33+00:00\",\"dateModified\":\"2026-04-14T11:10:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/\"},\"wordCount\":518,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg\",\"keywords\":[\"Altanet Craiova\",\"API Security\",\"BOLA\",\"Dezvoltare Web\",\"Furt Date\",\"OWASP Top 10\",\"Securitate Aplicatii\",\"Vulnerabilitati API\"],\"articleSection\":[\"Securitate cibernetica\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/\",\"url\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/\",\"name\":\"Vulnerabilitati API: Cum fura hackerii datele\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg\",\"datePublished\":\"2026-01-20T12:58:33+00:00\",\"dateModified\":\"2026-04-14T11:10:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/#\\\/schema\\\/person\\\/c700a208fcd09d44b3b512626fac4be1\"},\"description\":\"Ce sunt Vulnerabilitatile API? Afla cum hackerii pot fura baza de date prin aplicatiile tale, fara sa sparga serverul.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#primaryimage\",\"url\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg\",\"width\":2560,\"height\":1396,\"caption\":\"Ilustratie conceptuala cu un ospatar robot care serveste date confidentiale unui hacker simbolizand o vulnerabilitate de tip API\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/vulnerabilitati-api-securitate-aplicatii-furt-date\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Prima pagin\u0103\",\"item\":\"https:\\\/\\\/altanet.ro\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilitati API: &#8222;Usile din spate&#8221; prin care aplicatiile tale permit accesul hackerilor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/#website\",\"url\":\"https:\\\/\\\/altanet.ro\\\/\",\"name\":\"Altanet\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/altanet.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/#\\\/schema\\\/person\\\/c700a208fcd09d44b3b512626fac4be1\",\"name\":\"Cristi Nefiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g\",\"caption\":\"Cristi Nefiru\"},\"url\":\"https:\\\/\\\/altanet.ro\\\/en\\\/author\\\/cristi-nefiru\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilitati API: Cum fura hackerii datele","description":"What are API Vulnerabilities? Learn how hackers can steal your database through your applications, without breaking the server.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/altanet.ro\/en\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerabilitati API: Cum fura hackerii datele","og_description":"Ce sunt Vulnerabilitatile API? Afla cum hackerii pot fura baza de date prin aplicatiile tale, fara sa sparga serverul.","og_url":"https:\/\/altanet.ro\/en\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/","og_site_name":"Altanet","article_published_time":"2026-01-20T12:58:33+00:00","article_modified_time":"2026-04-14T11:10:58+00:00","og_image":[{"width":2560,"height":1396,"url":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg","type":"image\/jpeg"}],"author":"Cristi Nefiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cristi Nefiru","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#article","isPartOf":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/"},"author":{"name":"Cristi Nefiru","@id":"https:\/\/altanet.ro\/#\/schema\/person\/c700a208fcd09d44b3b512626fac4be1"},"headline":"Vulnerabilitati API: &#8222;Usile din spate&#8221; prin care aplicatiile tale permit accesul hackerilor","datePublished":"2026-01-20T12:58:33+00:00","dateModified":"2026-04-14T11:10:58+00:00","mainEntityOfPage":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/"},"wordCount":518,"commentCount":0,"image":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#primaryimage"},"thumbnailUrl":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg","keywords":["Altanet Craiova","API Security","BOLA","Dezvoltare Web","Furt Date","OWASP Top 10","Securitate Aplicatii","Vulnerabilitati API"],"articleSection":["Securitate cibernetica"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/","url":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/","name":"Vulnerabilitati API: Cum fura hackerii datele","isPartOf":{"@id":"https:\/\/altanet.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#primaryimage"},"image":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#primaryimage"},"thumbnailUrl":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg","datePublished":"2026-01-20T12:58:33+00:00","dateModified":"2026-04-14T11:10:58+00:00","author":{"@id":"https:\/\/altanet.ro\/#\/schema\/person\/c700a208fcd09d44b3b512626fac4be1"},"description":"What are API Vulnerabilities? Learn how hackers can steal your database through your applications, without breaking the server.","breadcrumb":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#primaryimage","url":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg","contentUrl":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/vulnerabilitati-api-cum-fura-hackerii-datele-v2-scaled.jpg","width":2560,"height":1396,"caption":"Ilustratie conceptuala cu un ospatar robot care serveste date confidentiale unui hacker simbolizand o vulnerabilitate de tip API"},{"@type":"BreadcrumbList","@id":"https:\/\/altanet.ro\/2026\/01\/20\/vulnerabilitati-api-securitate-aplicatii-furt-date\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Prima pagin\u0103","item":"https:\/\/altanet.ro\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilitati API: &#8222;Usile din spate&#8221; prin care aplicatiile tale permit accesul hackerilor"}]},{"@type":"WebSite","@id":"https:\/\/altanet.ro\/#website","url":"https:\/\/altanet.ro\/","name":"Altanet","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/altanet.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/altanet.ro\/#\/schema\/person\/c700a208fcd09d44b3b512626fac4be1","name":"Cristi Nefiru","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g","caption":"Cristi Nefiru"},"url":"https:\/\/altanet.ro\/en\/author\/cristi-nefiru\/"}]}},"_links":{"self":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts\/4828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/comments?post=4828"}],"version-history":[{"count":5,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts\/4828\/revisions"}],"predecessor-version":[{"id":5433,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts\/4828\/revisions\/5433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/media\/4831"}],"wp:attachment":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/media?parent=4828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/categories?post=4828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/tags?post=4828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}