{"id":18026,"date":"2025-04-05T13:05:08","date_gmt":"2025-04-05T13:05:08","guid":{"rendered":""},"modified":"2025-05-24T17:21:00","modified_gmt":"2025-05-24T17:21:00","slug":"cve-2023-6699-sandbox-escape-vulnerability-in-webassembly-wasm-in-v8-javascript-engine","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2023-6699-sandbox-escape-vulnerability-in-webassembly-wasm-in-v8-javascript-engine\/","title":{"rendered":"CVE-2023-6699: Sandbox Escape Vulnerability in WebAssembly (Wasm) in V8 JavaScript Engine"},"content":{"rendered":"<h2 class=\"\" data-start=\"226\" data-end=\"237\">Overview<\/h2>\n<p class=\"\" data-start=\"239\" data-end=\"636\">CVE-2023-6699 is a high-severity vulnerability identified in the V8 JavaScript engine used by Chromium-based browsers such as <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3619-critical-heap-buffer-overflow-vulnerability-in-google-chrome-codecs\/\"  data-wpil-monitor-id=\"40076\">Google Chrome<\/a>, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-25000-type-confusion-vulnerability-in-microsoft-edge-chromium-based\/\"  data-wpil-monitor-id=\"29911\">Microsoft Edge<\/a>, and others. The flaw resides in the WebAssembly (Wasm) implementation, allowing attackers to potentially execute arbitrary code outside the intended sandbox, resulting in full system compromise when combined with other exploits.<\/p>\n<p class=\"\" data-start=\"638\" data-end=\"885\">Given V8\u2019s widespread use across browsers and JavaScript runtimes, this vulnerability represents a significant security threat, particularly in highly targeted environments like enterprise workstations, zero-day markets, and surveillance contexts.<\/p>\n<h2 class=\"\" data-start=\"892\" data-end=\"916\">Vulnerability Summary<\/h2>\n<div class=\"group pointer-events-none relative flex justify-center *:pointer-events-auto\"><button class=\"hover:bg-token-main-surface-secondary text-token-text-secondary pointer-events-auto rounded-lg px-1 py-1 opacity-0 transition-opacity duration-200 group-focus-within:opacity-100 group-hover:opacity-100\"><\/button><\/p>\n<div class=\"tableContainer horzScrollShadows relative\">\n<table class=\"min-w-full\" data-start=\"918\" data-end=\"1499\">\n<thead data-start=\"918\" data-end=\"990\">\n<tr data-start=\"918\" data-end=\"990\">\n<th data-start=\"918\" data-end=\"943\">Field<\/th>\n<th data-start=\"943\" data-end=\"990\">Detail<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"1064\" data-end=\"1499\">\n<tr data-start=\"1064\" data-end=\"1136\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1064\" data-end=\"1089\"><strong data-start=\"1066\" data-end=\"1076\">CVE ID<\/strong><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1089\" data-end=\"1136\">CVE-2023-6699<\/td>\n<\/tr>\n<tr data-start=\"1137\" data-end=\"1209\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1137\" data-end=\"1162\"><strong data-start=\"1139\" data-end=\"1151\">Severity<\/strong><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1162\" data-end=\"1209\">High (CVSS Score: 8.8)<\/td>\n<\/tr>\n<tr data-start=\"1210\" data-end=\"1281\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1210\" data-end=\"1235\"><strong data-start=\"1212\" data-end=\"1229\">Attack Vector<\/strong><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1235\" data-end=\"1281\">Remote (via malicious web content)<\/td>\n<\/tr>\n<tr data-start=\"1282\" data-end=\"1354\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1282\" data-end=\"1307\"><strong data-start=\"1284\" data-end=\"1307\">Privileges Required<\/strong><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1307\" data-end=\"1354\">None<\/td>\n<\/tr>\n<tr data-start=\"1355\" data-end=\"1426\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1355\" data-end=\"1380\"><strong data-start=\"1357\" data-end=\"1377\">User Interaction<\/strong><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1380\" data-end=\"1426\">Required (visiting a malicious webpage)<\/td>\n<\/tr>\n<tr data-start=\"1427\" data-end=\"1499\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1427\" data-end=\"1452\"><strong data-start=\"1429\" data-end=\"1439\">Impact<\/strong><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)] min-w-[calc(var(--thread-content-max-width)\/3)]\" data-start=\"1452\" data-end=\"1499\">Sandbox escape \u2192 Arbitrary <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-45199-remote-code-execution-vulnerability-in-insightsoftware-hive-jdbc\/\"  data-wpil-monitor-id=\"29929\">Code Execution<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<h2 class=\"\" data-start=\"1506\" data-end=\"1526\">Affected Products<\/h2>\n<div class=\"group pointer-events-none relative flex justify-center *:pointer-events-auto\"><button class=\"hover:bg-token-main-surface-secondary text-token-text-secondary pointer-events-auto rounded-lg px-1 py-1 opacity-0 transition-opacity duration-200 group-focus-within:opacity-100 group-hover:opacity-100\"><\/button><\/p>\n<div class=\"tableContainer horzScrollShadows relative\">\n<table class=\"min-w-full\" data-start=\"1528\" data-end=\"1881\">\n<thead data-start=\"1528\" data-end=\"1586\">\n<tr data-start=\"1528\" data-end=\"1586\">\n<th data-start=\"1528\" data-end=\"1552\">Product<\/th>\n<th data-start=\"1552\" data-end=\"1586\">Affected Versions<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"1646\" data-end=\"1881\">\n<tr data-start=\"1646\" data-end=\"1704\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1646\" data-end=\"1670\"><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3620-google-chrome-use-after-free-vulnerability-in-usb\/\"  data-wpil-monitor-id=\"40745\">Google Chrome<\/a><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1670\" data-end=\"1704\">Prior to 119.0.6045.123<\/td>\n<\/tr>\n<tr data-start=\"1705\" data-end=\"1763\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1705\" data-end=\"1729\"><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47181-microsoft-edge-improper-link-resolution-vulnerability\/\"  data-wpil-monitor-id=\"54916\">Microsoft Edge<\/a><\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1729\" data-end=\"1763\"><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3248-critical-code-injection-vulnerability-in-langflow-versions-prior-to-1-3-0\/\"  data-wpil-monitor-id=\"30431\">Versions using vulnerable<\/a> V8<\/td>\n<\/tr>\n<tr data-start=\"1764\" data-end=\"1822\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1764\" data-end=\"1788\">Chromium Embedded<\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1788\" data-end=\"1822\">Any build using affected V8<\/td>\n<\/tr>\n<tr data-start=\"1823\" data-end=\"1881\">\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1823\" data-end=\"1847\">Electron apps<\/td>\n<td class=\"max-w-[calc(var(--thread-content-max-width)*2\/3)]\" data-start=\"1847\" data-end=\"1881\">Using outdated Chromium core<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<h2 class=\"\" data-start=\"1888\" data-end=\"1912\">How the Exploit Works<\/h2>\n<p class=\"\" data-start=\"1914\" data-end=\"2331\">The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-33094-memory-corruption-vulnerability-in-vk-synchronization-with-kasan\/\"  data-wpil-monitor-id=\"30969\">vulnerability originates from incorrect memory<\/a> handling in the WebAssembly component of the V8 JavaScript engine. WebAssembly, designed to offer near-native performance inside the browser, is sandboxed by default to prevent <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43564-improper-access-control-vulnerability-in-coldfusion-leading-to-arbitrary-file-system-read\/\"  data-wpil-monitor-id=\"49408\">arbitrary memory access<\/a>. However, CVE-2023-6699 <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30206-hardcoded-jwt-secret-exploitation-in-dpanel-docker-management-system\/\"  data-wpil-monitor-id=\"35479\">exploits a bug in bounds checking and memory management<\/a> that allows a malicious WebAssembly module to escape its intended memory sandbox.<\/p>\n<p class=\"\" data-start=\"2333\" data-end=\"2481\">This sandbox escape enables the attacker to read\/write memory outside the Wasm instance, leading to arbitrary <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-41788-critical-code-execution-vulnerability-in-sentron-7kt-pac1260-data-manager\/\"  data-wpil-monitor-id=\"30696\">code execution<\/a> in the browser process.<\/p>\n<p class=\"\" data-start=\"2483\" data-end=\"2674\">Although CVE-2023-6699 on its own doesn\u2019t provide full <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45746-unauthorized-system-access-via-hardcoded-jwt-secret-in-zkt-zkbio-cvsecurity\/\"  data-wpil-monitor-id=\"49409\">system access<\/a>, it is highly valuable when chained with other vulnerabilities (e.g., a renderer-to-kernel exploit) for full exploitation.<\/p><div id=\"ameeb-2335269373\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<h2 class=\"\" data-start=\"2681\" data-end=\"2711\">Conceptual Exploit Scenario<\/h2>\n<p class=\"\" data-start=\"2713\" data-end=\"2792\">A conceptual example involves a website embedding a crafted WebAssembly module:<\/p>\n<div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"\" data-line=\"\">&lt;span class=&quot;hljs-comment&quot;&gt;\/\/ JavaScript triggering the Wasm exploit&lt;\/span&gt;<br \/>\n&lt;span class=&quot;hljs-keyword&quot;&gt;const&lt;\/span&gt; buffer = &lt;span class=&quot;hljs-keyword&quot;&gt;new&lt;\/span&gt; &lt;span class=&quot;hljs-title class_&quot;&gt;WebAssembly&lt;\/span&gt;.&lt;span class=&quot;hljs-title class_&quot;&gt;Memory&lt;\/span&gt;({ &lt;span class=&quot;hljs-attr&quot;&gt;initial&lt;\/span&gt;: &lt;span class=&quot;hljs-number&quot;&gt;1&lt;\/span&gt; });<br \/>\n&lt;span class=&quot;hljs-keyword&quot;&gt;const&lt;\/span&gt; wasmCode = &lt;span class=&quot;hljs-keyword&quot;&gt;new&lt;\/span&gt; &lt;span class=&quot;hljs-title class_&quot;&gt;Uint8Array&lt;\/span&gt;([...maliciousBytes]);<br \/>\n&lt;span class=&quot;hljs-title class_&quot;&gt;WebAssembly&lt;\/span&gt;.&lt;span class=&quot;hljs-title function_&quot;&gt;instantiate&lt;\/span&gt;(wasmCode, { &lt;span class=&quot;hljs-attr&quot;&gt;js&lt;\/span&gt;: { &lt;span class=&quot;hljs-attr&quot;&gt;mem&lt;\/span&gt;: buffer } });<br \/>\n<\/code><\/div>\n<\/div>\n<p class=\"\" data-start=\"3024\" data-end=\"3157\">When a user visits the malicious site, the Wasm <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-55354-protection-mechanism-failure-in-lucee-leading-to-unauthorized-code-execution-and-data-access\/\"  data-wpil-monitor-id=\"31077\">code bypasses memory protections and executes<\/a> unintended behavior within the browser.<\/p>\n<h2 data-start=\"3024\" data-end=\"3157\">Recommendations for Mitigation<\/h2>\n<p class=\"\" data-start=\"3199\" data-end=\"3286\">To protect against CVE-2023-6699, all users and administrators are strongly advised to:<\/p>\n<ul data-start=\"3288\" data-end=\"4112\">\n<li class=\"\" data-start=\"3288\" data-end=\"3449\">\n<p class=\"\" data-start=\"3290\" data-end=\"3449\">Update Browsers Immediately<br data-start=\"3321\" data-end=\"3324\" \/>Ensure Chrome, Edge, Brave, and other Chromium-based browsers are <a href=\"https:\/\/www.ameeba.com\/blog\/unpacking-politico-s-weekly-cybersecurity-update-a-deep-dive-into-the-latest-threat-landscape\/\"  data-wpil-monitor-id=\"54917\">updated to the latest<\/a> version (119.0.6045.123 or higher).<\/p>\n<\/li>\n<li class=\"\" data-start=\"3453\" data-end=\"3585\">\n<p class=\"\" data-start=\"3455\" data-end=\"3585\">Patch Electron-Based Applications<br data-start=\"3492\" data-end=\"3495\" \/>If using Electron apps, ensure they are built with an up-to-date version of Chromium\/V8.<\/p>\n<\/li>\n<li class=\"\" data-start=\"3587\" data-end=\"3766\">\n<p class=\"\" data-start=\"3589\" data-end=\"3766\">Disable WebAssembly in Sensitive Contexts<br data-start=\"3634\" data-end=\"3637\" \/>In high-security environments, consider temporarily disabling WebAssembly via browser flags or content <a class=\"wpil_keyword_link\" href=\"https:\/\/chat.ameeba.com\"   title=\"security\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"29344\">security<\/a> policies (CSP).<\/p>\n<\/li>\n<li class=\"\" data-start=\"3768\" data-end=\"3949\">\n<p class=\"\" data-start=\"3770\" data-end=\"3949\">Use Script <a class=\"wpil_keyword_link\" href=\"https:\/\/ameeba.com\"   title=\"Isolation\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"29343\">Isolation<\/a> and Site Sandboxing<br data-start=\"3814\" data-end=\"3817\" \/>Enforce origin isolation and use <code class=\"\" data-line=\"\">Cross-Origin-Opener-Policy<\/code> and <code class=\"\" data-line=\"\">Cross-Origin-Embedder-Policy<\/code> headers to limit exploit surface.<\/p>\n<\/li>\n<li class=\"\" data-start=\"3951\" data-end=\"4112\">\n<p class=\"\" data-start=\"3953\" data-end=\"4112\">Employ <a href=\"https:\/\/www.ameeba.com\/blog\/demystifying-cybersecurity-indicators-the-power-of-iocs-iobs-and-ioas-in-threat-detection-and-prevention\/\"  data-wpil-monitor-id=\"40077\">Threat Detection<\/a> and EDR<br data-start=\"3988\" data-end=\"3991\" \/>Use <a class=\"wpil_keyword_link\" href=\"https:\/\/www.ameeba.com\"   title=\"endpoint\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"29345\">endpoint<\/a> detection tools that can monitor for abnormal behavior tied to browser processes or native code execution.<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"\" data-start=\"4119\" data-end=\"4143\">Timeline and Response<\/h2>\n<ul data-start=\"4145\" data-end=\"4401\">\n<li class=\"\" data-start=\"4145\" data-end=\"4176\">\n<p class=\"\" data-start=\"4147\" data-end=\"4176\">Reported: November 2023<\/p>\n<\/li>\n<li class=\"\" data-start=\"4177\" data-end=\"4237\">\n<p class=\"\" data-start=\"4179\" data-end=\"4237\">Patched in Chromium: December 2023 (v119.0.6045.123)<\/p>\n<\/li>\n<li class=\"\" data-start=\"4238\" data-end=\"4288\">\n<p class=\"\" data-start=\"4240\" data-end=\"4288\">Google Project Zero Involvement: Confirmed<\/p>\n<\/li>\n<li class=\"\" data-start=\"4289\" data-end=\"4401\">\n<p class=\"\" data-start=\"4291\" data-end=\"4401\">Public Exploitation: No known active exploits at the time of publication, but highly likely to be targeted<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"\" data-start=\"4408\" data-end=\"4427\">Closing Thoughts<\/h2>\n<p class=\"\" data-start=\"4429\" data-end=\"4691\">CVE-2023-6699 is another demonstration of the ongoing <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24297-high-risk-javascript-code-injection-vulnerability\/\"  data-wpil-monitor-id=\"35823\">risks posed by highly complex JavaScript<\/a> engines and WebAssembly runtimes. As performance demands and browser capabilities continue to grow, so too does the attack surface available to advanced threat actors.<\/p>\n<p class=\"\" data-start=\"4693\" data-end=\"4910\">Developers and organizations are urged to follow defense-in-depth principles, limit exposure to just-in-time compilation and WebAssembly where unnecessary, and maintain a proactive update policy to stay protected.<\/p><div id=\"ameeb-1902671195\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2023-6699 is a high-severity vulnerability identified in the V8 JavaScript engine used by Chromium-based browsers such as Google Chrome, Microsoft Edge, and others. The flaw resides in the WebAssembly (Wasm) implementation, allowing attackers to potentially execute arbitrary code outside the intended sandbox, resulting in full system compromise when combined with other exploits. Given V8\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[91,88,82],"product":[95],"attack_vector":[80],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-18026","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-google","vendor-linux","vendor-microsoft","product-linux-kernel","attack_vector-rce"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/18026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=18026"}],"version-history":[{"count":25,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/18026\/revisions"}],"predecessor-version":[{"id":49064,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/18026\/revisions\/49064"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=18026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=18026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=18026"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=18026"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=18026"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=18026"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=18026"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=18026"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=18026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}