{"id":26511,"date":"2026-04-30T15:43:29","date_gmt":"2026-04-30T14:43:29","guid":{"rendered":"https:\/\/www.heartinternet.uk\/blog\/?p=26511"},"modified":"2026-04-30T15:43:29","modified_gmt":"2026-04-30T14:43:29","slug":"copy-fail-linux-vulnerability","status":"publish","type":"post","link":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/","title":{"rendered":"Copy Fail Linux Vulnerability (CVE-2026-31431)"},"content":{"rendered":"<p>On 29 April 2026, security researchers at Theori (Xint Code) publicly disclosed CVE-2026-31431, known as \u201cCopy Fail.\u201d It is a local privilege escalation flaw in the Linux kernel\u2019s AF_ALG cryptographic interface. Any unprivileged local user, including a compromised web application running as a low-privilege user such as www-data, apache, or a cPanel customer account, can escalate to root within seconds. The vulnerability has existed in mainstream Linux kernels since 2017 and a working public exploit is already in circulation.<\/p>\n<h2>Who is affected?<\/h2>\n<h3>Not affected by this vulnerability<\/h3>\n<ul>\n<li>CentOS 6 and CentOS 7: NOT affected. No action required.<\/li>\n<li>AlmaLinux, Rocky Linux, RHEL, CloudLinux (versions 8 and 9): Affected.<\/li>\n<li>Ubuntu and Debian (all currently supported releases): Affected.<\/li>\n<\/ul>\n<p>If you are unsure which distribution you are running, the following command will tell you:<\/p>\n<pre><code>cat \/etc\/os-release<\/code><\/pre>\n<h2>Step 1: Confirm whether your kernel is vulnerable<\/h2>\n<p>Run this command as root:<\/p>\n<pre><code>grep CRYPTO_USER_API_AEAD \/boot\/config-$(uname -r)<\/code><\/pre>\n<ul>\n<li>No output, or the file does not exist: your kernel is not affected. No further action required.<\/li>\n<li>Output ending in &#8220;=m&#8221; &#8211; typical for Ubuntu and Debian: affected, follow Path B below.<\/li>\n<li>Output ending in &#8220;=y&#8221; &#8211; typical for AlmaLinux, Rocky, RHEL, CloudLinux: affected, follow Path A below.<\/li>\n<\/ul>\n<h2>Step 2a: Path A &#8211; AlmaLinux \/ Rocky \/ RHEL \/ CloudLinux<\/h2>\n<p>On these distributions the vulnerable code is compiled directly into the kernel, so the standard module-blacklist approach will silently fail and leave your server vulnerable. Use the following kernel boot parameter instead, which prevents the vulnerable subsystem from initialising at boot:<\/p>\n<pre><code>grubby --update-kernel=ALL --args=\"initcall_blacklist=algif_aead_init\"\r\nreboot<\/code><\/pre>\n<p>A reboot is required for the change to take effect.<\/p>\n<h2>Step 2b: Path B &#8211; Ubuntu \/ Debian<\/h2>\n<p>On these distributions the vulnerable code is a loadable module and can be disabled with:<\/p>\n<pre><code>echo \"install algif_aead \/bin\/false\" &gt; \/etc\/modprobe.d\/disable-algif.conf\r\nrmmod algif_aead 2&gt;\/dev\/null || true<\/code><\/pre>\n<p>A reboot is not strictly required but is recommended to ensure the configuration is loaded cleanly on next boot.<\/p>\n<h2>Step 3: Verify the mitigation has taken effect<\/h2>\n<p>As a non-root user, run the following test. It attempts to bind an AF_ALG AEAD socket, the operation an attacker would perform, and reports whether the kernel still permits it:<\/p>\n<pre><code>perl -e '\r\nuse Socket;\r\nsocket(S, 38, 5, 0) or die \"socket: $!\";\r\nmy $addr = pack(\"S a14 L L a64\", 38, \"aead\", 0, 0, \"authenc(hmac(sha256),cbc(aes))\");\r\nbind(S, $addr) or die \"bind: $!\";\r\nprint \"bind ok\\n\";\r\n'<\/code><\/pre>\n<ul>\n<li>Output <code>bind ok<\/code> If you get this output, your server is still vulnerable. For Path A, re-check Step 2 and ensure you have rebooted.\u00a0 For Path B, run <code>rmmod<\/code>.<\/li>\n<li>Output <code>bind: No such file or directory<\/code> If you get this output, the mitigation is working.<\/li>\n<\/ul>\n<h2>Step 4: Apply the official kernel patch when available<\/h2>\n<p>The mitigation above disables the AF_ALG authenticated-encryption interface. This is safe for the overwhelming majority of workloads, it is not used by SSH, OpenSSL, dm-crypt\/LUKS, IPsec, or kTLS,\u00a0but it should be considered a temporary measure. When your distribution publishes a kernel update incorporating upstream commit <code>a664bf3d603d<\/code>\u00a0please apply it and reboot:<\/p>\n<ul>\n<li>Ubuntu \/ Debian: <code>apt update &amp;&amp; apt upgrade &amp;&amp; reboot<\/code><\/li>\n<li>AlmaLinux \/ Rocky: <code>dnf update kernel &amp;&amp; reboot<\/code><\/li>\n<li>CloudLinux: a kernel update and a KernelCare live patch are in active development. Please monitor <a href=\"https:\/\/cloudlinux.statuspage.io\">https:\/\/cloudlinux.statuspage.io<\/a> for availability.<\/li>\n<\/ul>\n<p>Once the patched kernel is running, the temporary mitigation can be removed if you wish.<\/p>\n<h2>Need assistance?<\/h2>\n<p>If you would prefer a Heart Internet engineer to apply the mitigation on your server, please raise a ticket through your control panel and reference \u201cCVE-2026-31431\u201d, but please be aware that managed customers are being prioritised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 29 April 2026, security researchers at Theori (Xint Code) publicly disclosed CVE-2026-31431, known as \u201cCopy Fail.\u201d It is a local privilege escalation flaw in the Linux kernel\u2019s AF_ALG cryptographic&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,164],"tags":[],"class_list":{"0":"post-26511","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-heart-internet","8":"category-news"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Copy Fail Linux Vulnerability (CVE-2026-31431) - Heart Internet<\/title>\n<meta name=\"description\" content=\"Copy Fail Linux Vulnerability (CVE-2026-31431) - Written by the team at Heart Internet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Copy Fail Linux Vulnerability (CVE-2026-31431) - Heart Internet\" \/>\n<meta property=\"og:description\" content=\"Copy Fail Linux Vulnerability (CVE-2026-31431) - Written by the team at Heart Internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Heart Internet\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/heartinternet\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-30T14:43:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1281\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eliot Chambers-Ostler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@heartinternet\" \/>\n<meta name=\"twitter:site\" content=\"@heartinternet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eliot Chambers-Ostler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/\"},\"author\":{\"name\":\"Eliot Chambers-Ostler\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28\"},\"headline\":\"Copy Fail Linux Vulnerability (CVE-2026-31431)\",\"datePublished\":\"2026-04-30T14:43:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/\"},\"wordCount\":506,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg\",\"articleSection\":[\"Heart Internet\",\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/\",\"name\":\"Copy Fail Linux Vulnerability (CVE-2026-31431) - Heart Internet\",\"isPartOf\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg\",\"datePublished\":\"2026-04-30T14:43:29+00:00\",\"description\":\"Copy Fail Linux Vulnerability (CVE-2026-31431) - Written by the team at Heart Internet.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg\",\"width\":1281,\"height\":720,\"caption\":\"Website security padlock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.heartinternet.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Copy Fail Linux Vulnerability (CVE-2026-31431)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heartblog.victory.digital\/#website\",\"url\":\"https:\/\/heartblog.victory.digital\/\",\"name\":\"Heart Internet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heartblog.victory.digital\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\",\"name\":\"Heart Internet\",\"url\":\"https:\/\/heartblog.victory.digital\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp\",\"width\":992,\"height\":252,\"caption\":\"Heart Internet\"},\"image\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/heartinternet\/\",\"https:\/\/x.com\/heartinternet\",\"https:\/\/www.linkedin.com\/company\/heart-internet-ltd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28\",\"name\":\"Eliot Chambers-Ostler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg\",\"caption\":\"Eliot Chambers-Ostler\"},\"url\":\"https:\/\/www.heartinternet.uk\/blog\/author\/eliot-chambers-ostler\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Copy Fail Linux Vulnerability (CVE-2026-31431) - Heart Internet","description":"Copy Fail Linux Vulnerability (CVE-2026-31431) - Written by the team at Heart Internet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/","og_locale":"en_GB","og_type":"article","og_title":"Copy Fail Linux Vulnerability (CVE-2026-31431) - Heart Internet","og_description":"Copy Fail Linux Vulnerability (CVE-2026-31431) - Written by the team at Heart Internet.","og_url":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/","og_site_name":"Heart Internet","article_publisher":"https:\/\/www.facebook.com\/heartinternet\/","article_published_time":"2026-04-30T14:43:29+00:00","og_image":[{"width":1281,"height":720,"url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg","type":"image\/jpeg"}],"author":"Eliot Chambers-Ostler","twitter_card":"summary_large_image","twitter_creator":"@heartinternet","twitter_site":"@heartinternet","twitter_misc":{"Written by":"Eliot Chambers-Ostler","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/"},"author":{"name":"Eliot Chambers-Ostler","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28"},"headline":"Copy Fail Linux Vulnerability (CVE-2026-31431)","datePublished":"2026-04-30T14:43:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/"},"wordCount":506,"commentCount":0,"publisher":{"@id":"https:\/\/heartblog.victory.digital\/#organization"},"image":{"@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg","articleSection":["Heart Internet","News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/","url":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/","name":"Copy Fail Linux Vulnerability (CVE-2026-31431) - Heart Internet","isPartOf":{"@id":"https:\/\/heartblog.victory.digital\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg","datePublished":"2026-04-30T14:43:29+00:00","description":"Copy Fail Linux Vulnerability (CVE-2026-31431) - Written by the team at Heart Internet.","breadcrumb":{"@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#primaryimage","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2026\/03\/website-security-2.jpg","width":1281,"height":720,"caption":"Website security padlock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.heartinternet.uk\/blog\/copy-fail-linux-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.heartinternet.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Copy Fail Linux Vulnerability (CVE-2026-31431)"}]},{"@type":"WebSite","@id":"https:\/\/heartblog.victory.digital\/#website","url":"https:\/\/heartblog.victory.digital\/","name":"Heart Internet","description":"","publisher":{"@id":"https:\/\/heartblog.victory.digital\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heartblog.victory.digital\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/heartblog.victory.digital\/#organization","name":"Heart Internet","url":"https:\/\/heartblog.victory.digital\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp","width":992,"height":252,"caption":"Heart Internet"},"image":{"@id":"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/heartinternet\/","https:\/\/x.com\/heartinternet","https:\/\/www.linkedin.com\/company\/heart-internet-ltd"]},{"@type":"Person","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28","name":"Eliot Chambers-Ostler","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/image\/","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg","caption":"Eliot Chambers-Ostler"},"url":"https:\/\/www.heartinternet.uk\/blog\/author\/eliot-chambers-ostler\/"}]}},"_links":{"self":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts\/26511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/comments?post=26511"}],"version-history":[{"count":6,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts\/26511\/revisions"}],"predecessor-version":[{"id":26525,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts\/26511\/revisions\/26525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/media\/26240"}],"wp:attachment":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/media?parent=26511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/categories?post=26511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/tags?post=26511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}