{"id":1372,"date":"2026-02-05T04:47:15","date_gmt":"2026-02-05T04:47:15","guid":{"rendered":"https:\/\/cnelindia.com\/blog\/?p=1372"},"modified":"2026-02-05T04:47:15","modified_gmt":"2026-02-05T04:47:15","slug":"from-vulnerable-to-vault-secure-reinforcing-application-server-security","status":"publish","type":"post","link":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/","title":{"rendered":"From Vulnerable to Vault-Secure: Reinforcing Application &#038; Server Security"},"content":{"rendered":"<h2>Project Objective<\/h2>\n<p>The primary objective of this project was to secure the application at both the application and infrastructure levels by implementing industry best practices, without impacting user experience or existing functionality.<\/p>\n<h2>Key Security Challenges Identified<\/h2>\n<h3>1. Improper Error Handling<\/h3>\n<p>The application was exposing raw server and database error messages, revealing sensitive internal details.<\/p>\n<ul>\n<li>Lack of centralized error handling<\/li>\n<li>Technical errors visible to end users<\/li>\n<li>No structured backend logging mechanism<\/li>\n<\/ul>\n<h3>2. Clickjacking Vulnerability<\/h3>\n<p>The website could be embedded inside external iframes, making it vulnerable to deceptive UI-based attacks.<\/p>\n<h3>3. Missing Critical Security Headers<\/h3>\n<p>Essential HTTP security headers were not configured, leaving the application exposed to XSS, MIME sniffing, and protocol downgrade attacks.<\/p>\n<h3>4. Unwanted Open Ports<\/h3>\n<p>Multiple unused server ports were open, increasing the attack surface and infrastructure risk.<\/p>\n<h2>CnEL India\u2019s Strategic Solution<\/h2>\n<h3>Robust Error Handling &amp; Secure Logging<\/h3>\n<ul>\n<li>Implemented centralized backend exception handling<\/li>\n<li>Displayed only user-friendly error messages on the frontend<\/li>\n<li>Logged detailed technical errors securely in backend logs for monitoring and debugging<\/li>\n<\/ul>\n<h3>Clickjacking Protection<\/h3>\n<ul>\n<li>Configured <code>X-Frame-Options: DENY<\/code><\/li>\n<li>Implemented <code>Content-Security-Policy: frame-ancestors 'none'<\/code><\/li>\n<li>Ensured protection without impacting application behavior<\/li>\n<\/ul>\n<h3>Advanced Security Header Configuration<\/h3>\n<ul>\n<li>Implemented Content Security Policy (CSP)<\/li>\n<li>Enabled HTTP Strict Transport Security (HSTS)<\/li>\n<li>Added <code>X-Content-Type-Options: nosniff<\/code><\/li>\n<li>Configured <code>X-XSS-Protection<\/code><\/li>\n<li>Carefully tested frontend scripts to ensure CSP compatibility<\/li>\n<\/ul>\n<h3>Infrastructure &amp; Firewall Hardening<\/h3>\n<ul>\n<li>Audited all open server ports<\/li>\n<li>Closed unused and risky ports at the firewall level<\/li>\n<li>Restricted access to essential ports only (80 &amp; 443)<\/li>\n<\/ul>\n<h2>Why CnEL India Was the Best Choice<\/h2>\n<ul>\n<li>Deep expertise in application security and server hardening<\/li>\n<li>End-to-end approach covering backend, frontend, and infrastructure<\/li>\n<li>Security improvements without disrupting business operations<\/li>\n<li>Clear communication, documentation, and post-deployment validation<\/li>\n<li>Proactive risk assessment aligned with industry best practices<\/li>\n<\/ul>\n<h2>Project Outcome<\/h2>\n<p>The application is now significantly more secure, resilient, and compliant with modern security standards. All critical vulnerabilities were mitigated, the attack surface was reduced, and user trust was enhanced through a safer and more professional experience.<\/p>\n<h2>Client Review<\/h2>\n<blockquote><p><em>\u201cCnEL India demonstrated exceptional security expertise and attention to detail. They didn\u2019t just fix issues\u2014they explained risks, implemented best practices, and ensured nothing broke in the process. Our application is now secure, stable, and ready to scale with confidence.\u201d<\/em><\/p>\n<p><strong>\u2014 Client Security &amp; Technology Lead<\/strong><\/p><\/blockquote>\n<h2>Conclusion<\/h2>\n<p>This project highlights how <strong>CnEL India<\/strong> delivers more than just fixes\u2014we deliver <em>secure, scalable, and future-ready solutions<\/em>. When it comes to safeguarding applications and infrastructure, CnEL India stands as a trusted technology partner.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Project Objective The primary objective of this project was to secure the application at both the application and infrastructure levels by implementing industry best practices, without impacting user experience or existing functionality. Key Security Challenges Identified 1. Improper Error Handling The application was exposing raw server and database error messages, revealing sensitive internal details. Lack [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1373,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[166],"tags":[1284,837,40,1289,836,1288,1286,1287,835,1285],"class_list":["post-1372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies","tag-application-security","tag-clickjacking-protection","tag-cnel-india","tag-cybersecurity-case-study","tag-error-handling-best-practices","tag-infrastructure-security","tag-security-headers-implementation","tag-server-hardening","tag-vulnerability-remediation","tag-web-security-audit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From Vulnerable to Vault-Secure: Reinforcing Application &amp; Server Security - CnEL India<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Vulnerable to Vault-Secure: Reinforcing Application &amp; Server Security - CnEL India\" \/>\n<meta property=\"og:description\" content=\"Project Objective The primary objective of this project was to secure the application at both the application and infrastructure levels by implementing industry best practices, without impacting user experience or existing functionality. Key Security Challenges Identified 1. Improper Error Handling The application was exposing raw server and database error messages, revealing sensitive internal details. Lack [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CnEL India\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-05T04:47:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ChiefEditor89\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ChiefEditor89\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/\"},\"author\":{\"name\":\"ChiefEditor89\",\"@id\":\"https:\/\/cnelindia.com\/blog\/#\/schema\/person\/caef9ab130f73a0a587106567ba2ed30\"},\"headline\":\"From Vulnerable to Vault-Secure: Reinforcing Application &#038; Server Security\",\"datePublished\":\"2026-02-05T04:47:15+00:00\",\"dateModified\":\"2026-02-05T04:47:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/\"},\"wordCount\":392,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg\",\"keywords\":[\"application security\",\"clickjacking protection\",\"cnel india\",\"cybersecurity case study\",\"error handling best practices\",\"infrastructure security\",\"security headers implementation\",\"server hardening\",\"vulnerability remediation\",\"web security audit\"],\"articleSection\":[\"Case Studies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/\",\"url\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/\",\"name\":\"From Vulnerable to Vault-Secure: Reinforcing Application & Server Security - CnEL India\",\"isPartOf\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg\",\"datePublished\":\"2026-02-05T04:47:15+00:00\",\"dateModified\":\"2026-02-05T04:47:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage\",\"url\":\"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg\",\"contentUrl\":\"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg\",\"width\":1792,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cnelindia.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Vulnerable to Vault-Secure: Reinforcing Application &#038; Server Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cnelindia.com\/blog\/#website\",\"url\":\"https:\/\/cnelindia.com\/blog\/\",\"name\":\"CnEL India\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cnelindia.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cnelindia.com\/blog\/#organization\",\"name\":\"CnEL India\",\"url\":\"https:\/\/cnelindia.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cnelindia.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2024\/09\/logo-2.png\",\"contentUrl\":\"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2024\/09\/logo-2.png\",\"width\":59,\"height\":59,\"caption\":\"CnEL India\"},\"image\":{\"@id\":\"https:\/\/cnelindia.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cnelindia.com\/blog\/#\/schema\/person\/caef9ab130f73a0a587106567ba2ed30\",\"name\":\"ChiefEditor89\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cnelindia.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/70b03db954aa45fc2559e85f5d5bd13e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/70b03db954aa45fc2559e85f5d5bd13e?s=96&d=mm&r=g\",\"caption\":\"ChiefEditor89\"},\"url\":\"https:\/\/cnelindia.com\/blog\/author\/chiefeditor89\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Vulnerable to Vault-Secure: Reinforcing Application & Server Security - CnEL India","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/","og_locale":"en_US","og_type":"article","og_title":"From Vulnerable to Vault-Secure: Reinforcing Application & Server Security - CnEL India","og_description":"Project Objective The primary objective of this project was to secure the application at both the application and infrastructure levels by implementing industry best practices, without impacting user experience or existing functionality. Key Security Challenges Identified 1. Improper Error Handling The application was exposing raw server and database error messages, revealing sensitive internal details. Lack [&hellip;]","og_url":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/","og_site_name":"CnEL India","article_published_time":"2026-02-05T04:47:15+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg","type":"image\/jpeg"}],"author":"ChiefEditor89","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ChiefEditor89","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#article","isPartOf":{"@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/"},"author":{"name":"ChiefEditor89","@id":"https:\/\/cnelindia.com\/blog\/#\/schema\/person\/caef9ab130f73a0a587106567ba2ed30"},"headline":"From Vulnerable to Vault-Secure: Reinforcing Application &#038; Server Security","datePublished":"2026-02-05T04:47:15+00:00","dateModified":"2026-02-05T04:47:15+00:00","mainEntityOfPage":{"@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/"},"wordCount":392,"commentCount":0,"publisher":{"@id":"https:\/\/cnelindia.com\/blog\/#organization"},"image":{"@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg","keywords":["application security","clickjacking protection","cnel india","cybersecurity case study","error handling best practices","infrastructure security","security headers implementation","server hardening","vulnerability remediation","web security audit"],"articleSection":["Case Studies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/","url":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/","name":"From Vulnerable to Vault-Secure: Reinforcing Application & Server Security - CnEL India","isPartOf":{"@id":"https:\/\/cnelindia.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage"},"image":{"@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg","datePublished":"2026-02-05T04:47:15+00:00","dateModified":"2026-02-05T04:47:15+00:00","breadcrumb":{"@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#primaryimage","url":"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg","contentUrl":"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2026\/02\/can-you-create-a-graphical-featured-image-for-this-WordPress-post-Husein-React-Native-Spring-boot.jpeg","width":1792,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/cnelindia.com\/blog\/from-vulnerable-to-vault-secure-reinforcing-application-server-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cnelindia.com\/blog\/"},{"@type":"ListItem","position":2,"name":"From Vulnerable to Vault-Secure: Reinforcing Application &#038; Server Security"}]},{"@type":"WebSite","@id":"https:\/\/cnelindia.com\/blog\/#website","url":"https:\/\/cnelindia.com\/blog\/","name":"CnEL India","description":"","publisher":{"@id":"https:\/\/cnelindia.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cnelindia.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cnelindia.com\/blog\/#organization","name":"CnEL India","url":"https:\/\/cnelindia.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cnelindia.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2024\/09\/logo-2.png","contentUrl":"https:\/\/cnelindia.com\/blog\/wp-content\/uploads\/2024\/09\/logo-2.png","width":59,"height":59,"caption":"CnEL India"},"image":{"@id":"https:\/\/cnelindia.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cnelindia.com\/blog\/#\/schema\/person\/caef9ab130f73a0a587106567ba2ed30","name":"ChiefEditor89","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cnelindia.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/70b03db954aa45fc2559e85f5d5bd13e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70b03db954aa45fc2559e85f5d5bd13e?s=96&d=mm&r=g","caption":"ChiefEditor89"},"url":"https:\/\/cnelindia.com\/blog\/author\/chiefeditor89\/"}]}},"_links":{"self":[{"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/posts\/1372"}],"collection":[{"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/comments?post=1372"}],"version-history":[{"count":1,"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/posts\/1372\/revisions"}],"predecessor-version":[{"id":1374,"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/posts\/1372\/revisions\/1374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/media\/1373"}],"wp:attachment":[{"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/media?parent=1372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/categories?post=1372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cnelindia.com\/blog\/wp-json\/wp\/v2\/tags?post=1372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}