{"id":50703,"date":"2025-01-24T13:51:33","date_gmt":"2025-01-24T12:51:33","guid":{"rendered":"https:\/\/proid.cz\/kriticka-zranitelnost-fortigate-jak-se-chranit-pred-utoky-na-administrativni-pristupy\/"},"modified":"2025-01-30T13:46:07","modified_gmt":"2025-01-30T12:46:07","slug":"critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack","status":"publish","type":"post","link":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/","title":{"rendered":"Critical vulnerability in FortiGate: How can you protect yourself from attack?"},"content":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221;][vc_column][vc_empty_space height=&#8221;60&#8243;][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;40&#8243;][vc_column_text]<\/p>\n<h1>Critical vulnerability in FortiGate: How can you protect yourself from attack?<\/h1>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_empty_space height=&#8221;10&#8243;][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;19931&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221; image_hovers=&#8221;false&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<blockquote><p>The recently discovered <strong>CVE-2024-55591<\/strong> vulnerability in FortiGate devices exposed a&nbsp;serious security issue that could allow an attacker to bypass authentication and gain full access to the network infrastructure. Read our article to find out what steps you need to take to protect your organisation and how you can improve the security of your systems.<\/p><\/blockquote>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50&#8243;][vc_column_text]<\/p>\n<h3><b>What is the essence of vulnerability CVE-2024-55591?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Vulnerability CVE-2024-55591 is a&nbsp;critical vulnerability in Fortinet FortiOS and FortiProxy products that allows a&nbsp;remote attacker to bypass authentication and gain super-administrator privileges by sending specially crafted requests to the Node.js websocket module. This vulnerability has been actively exploited since November 2024.\u00a0<\/span><\/p>\n<h3><\/h3>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><b>Affected versions:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; FortiOS: versions 7.0.0 to 7.0.16<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; FortiProxy: versions 7.0.0 to 7.0.19 and 7.2.0 to 7.2.12<\/span>[\/vc_column_text][vc_column_text]<\/p>\n<h3><b>Why is it important to address the vulnerability?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Immediately after the vulnerability was disclosed, a&nbsp;list of more than 15,000 IP addresses of organizations that have not resolved this critical vulnerability appeared on the darknet. The data includes interface login credentials and other data that can be used to enter compromised systems.<\/span><\/p>\n<h3><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h3><b>Recommended Solution:<\/b><\/h3>\n<p><b>1) Software update<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Update to the following versions or newer:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0&#8211; FortiOS: version 7.0.17<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0&#8211; FortiProxy: version 7.0.20 or 7.2.13<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These updates contain fixes for vulnerability CVE-2024-55591.\u00a0<\/span><\/p>\n<h3><\/h3>\n<p><b>2) Access Restrictions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Until you upgrade, restrict access to administrative interfaces (HTTP\/HTTPS) to trusted IP addresses only or temporarily disable them.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>3) System monitoring<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Regularly check system logs for the following indicators of compromise:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0&#8211; Unusual logon activity with the &#8216;admin&#8217; user via &#8216;jsconsole&#8217;.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0&#8211; Creation of new admin accounts with randomly generated names.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0&#8211; The presence of IP addresses such as 1.1.1.1, 127.0.0.1, 2.2.2.2, 8.8.8.8 or 8.8.4.4 in the logs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This activity may indicate an attempt to exploit the vulnerability.\u00a0<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1737723166152{background-color: #f5f6f7 !important;border-radius: 30px !important;}&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;49844&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2>Secure FortiGate Access with ProID Multifactor Authentication<\/h2>\n<p>ProID tools provide reliable access security for FortiGate administrative consoles by adding an extra layer of verification. Using a&nbsp;mobile application or a&nbsp;smart card, organizations can easily implement multi-factor authentication (MFA), significantly enhancing protection against unauthorized access. The entire solution is fully compatible with the RADIUS protocol, ensuring quick integration into existing infrastructure and maximizing the security of your authentication processes.[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-f5f171f99c95ae32b4dd6425b06c7473.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-f5f171f99c95ae32b4dd6425b06c7473 > i {\n  margin-right: 8px;\n}\n<\/style><a href=\"https:\/\/proid.cz\/en\/demo-for-free\/\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off btn-inline-left \" target=\"_blank\" id=\"default-btn-f5f171f99c95ae32b4dd6425b06c7473\" rel=\"noopener\"><span>Free Trial<\/span><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;43758&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CVE-2024-55591 vulnerability is a&nbsp;critical security flaw in Fortinet FortiOS. Secure System Access with ProID Multi-Factor Authentication.<\/p>\n","protected":false},"author":1,"featured_media":50451,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"episode_type":"","audio_file":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","filesize_raw":""},"categories":[162,47],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical vulnerability in FortiGate: How can you protect yourself from attack? &ndash; ProID<\/title>\n<meta name=\"description\" content=\"The CVE-2024-55591 vulnerability is a critical security flaw in Fortinet FortiOS. Secure System Access with ProID Multi-Factor Authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical vulnerability in FortiGate: How can you protect yourself from attack? &ndash; ProID\" \/>\n<meta property=\"og:description\" content=\"The CVE-2024-55591 vulnerability is a critical security flaw in Fortinet FortiOS. Secure System Access with ProID Multi-Factor Authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ProID\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-24T12:51:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-30T12:46:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proid.cz\/wp-content\/uploads\/2025\/01\/IMG_9054-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ivo Vr\u00e1na\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ivo Vr\u00e1na\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/\"},\"author\":{\"name\":\"Ivo Vr\u00e1na\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b\"},\"headline\":\"Critical vulnerability in FortiGate: How can you protect yourself from attack?\",\"datePublished\":\"2025-01-24T12:51:33+00:00\",\"dateModified\":\"2025-01-30T12:46:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/\"},\"wordCount\":638,\"publisher\":{\"@id\":\"https:\/\/proid.cz\/en\/#organization\"},\"articleSection\":[\"Events\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/\",\"url\":\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/\",\"name\":\"Critical vulnerability in FortiGate: How can you protect yourself from attack? &ndash; ProID\",\"isPartOf\":{\"@id\":\"https:\/\/proid.cz\/en\/#website\"},\"datePublished\":\"2025-01-24T12:51:33+00:00\",\"dateModified\":\"2025-01-30T12:46:07+00:00\",\"description\":\"The CVE-2024-55591 vulnerability is a critical security flaw in Fortinet FortiOS. Secure System Access with ProID Multi-Factor Authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/proid.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical vulnerability in FortiGate: How can you protect yourself from attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proid.cz\/en\/#website\",\"url\":\"https:\/\/proid.cz\/en\/\",\"name\":\"ProID\",\"description\":\"Ultimate Digital Identity for Employees and Organisations\",\"publisher\":{\"@id\":\"https:\/\/proid.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proid.cz\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proid.cz\/en\/#organization\",\"name\":\"ProID by MONET+\",\"url\":\"https:\/\/proid.cz\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png\",\"contentUrl\":\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png\",\"width\":680,\"height\":680,\"caption\":\"ProID by MONET+\"},\"image\":{\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b\",\"name\":\"Ivo Vr\u00e1na\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g\",\"caption\":\"Ivo Vr\u00e1na\"},\"description\":\"Product Marketing Manager\",\"sameAs\":[\"https:\/\/cz.linkedin.com\/in\/ivovrana\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical vulnerability in FortiGate: How can you protect yourself from attack? &ndash; ProID","description":"The CVE-2024-55591 vulnerability is a critical security flaw in Fortinet FortiOS. Secure System Access with ProID Multi-Factor Authentication.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/","og_locale":"en_US","og_type":"article","og_title":"Critical vulnerability in FortiGate: How can you protect yourself from attack? &ndash; ProID","og_description":"The CVE-2024-55591 vulnerability is a critical security flaw in Fortinet FortiOS. Secure System Access with ProID Multi-Factor Authentication.","og_url":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/","og_site_name":"ProID","article_published_time":"2025-01-24T12:51:33+00:00","article_modified_time":"2025-01-30T12:46:07+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/proid.cz\/wp-content\/uploads\/2025\/01\/IMG_9054-scaled.jpg","type":"image\/jpeg"}],"author":"Ivo Vr\u00e1na","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ivo Vr\u00e1na","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/#article","isPartOf":{"@id":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/"},"author":{"name":"Ivo Vr\u00e1na","@id":"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b"},"headline":"Critical vulnerability in FortiGate: How can you protect yourself from attack?","datePublished":"2025-01-24T12:51:33+00:00","dateModified":"2025-01-30T12:46:07+00:00","mainEntityOfPage":{"@id":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/"},"wordCount":638,"publisher":{"@id":"https:\/\/proid.cz\/en\/#organization"},"articleSection":["Events","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/","url":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/","name":"Critical vulnerability in FortiGate: How can you protect yourself from attack? &ndash; ProID","isPartOf":{"@id":"https:\/\/proid.cz\/en\/#website"},"datePublished":"2025-01-24T12:51:33+00:00","dateModified":"2025-01-30T12:46:07+00:00","description":"The CVE-2024-55591 vulnerability is a critical security flaw in Fortinet FortiOS. Secure System Access with ProID Multi-Factor Authentication.","breadcrumb":{"@id":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/proid.cz\/en\/critical-vulnerability-in-fortigate-how-can-you-protect-yourself-from-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/proid.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Critical vulnerability in FortiGate: How can you protect yourself from attack?"}]},{"@type":"WebSite","@id":"https:\/\/proid.cz\/en\/#website","url":"https:\/\/proid.cz\/en\/","name":"ProID","description":"Ultimate Digital Identity for Employees and Organisations","publisher":{"@id":"https:\/\/proid.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proid.cz\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/proid.cz\/en\/#organization","name":"ProID by MONET+","url":"https:\/\/proid.cz\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png","contentUrl":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png","width":680,"height":680,"caption":"ProID by MONET+"},"image":{"@id":"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b","name":"Ivo Vr\u00e1na","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/proid.cz\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g","caption":"Ivo Vr\u00e1na"},"description":"Product Marketing Manager","sameAs":["https:\/\/cz.linkedin.com\/in\/ivovrana"]}]}},"_links":{"self":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts\/50703"}],"collection":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/comments?post=50703"}],"version-history":[{"count":6,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts\/50703\/revisions"}],"predecessor-version":[{"id":50709,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts\/50703\/revisions\/50709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/media\/50451"}],"wp:attachment":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/media?parent=50703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/categories?post=50703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/tags?post=50703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}