{"id":21465,"date":"2025-07-16T11:37:58","date_gmt":"2025-07-16T14:37:58","guid":{"rendered":"https:\/\/ostec.blog\/?p=21465"},"modified":"2025-07-16T11:37:58","modified_gmt":"2025-07-16T14:37:58","slug":"cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/","title":{"rendered":"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo"},"content":{"rendered":"<p>CVE-2025-49219 es una vulnerabilidad cr\u00edtica en Trend Micro Apex Central, una plataforma utilizada para la gesti\u00f3n centralizada de pol\u00edticas de seguridad en puntos finales y servidores. El problema fue informado por Zero Day Initiative (ZDI) y solo afecta a las versiones locales de la soluci\u00f3n, dejando fuera los entornos SaaS.<\/p>\n<p>La falla est\u00e1 relacionada con el uso de funciones obsoletas en bibliotecas externas, una condici\u00f3n clasificada como CWE-477. Este tipo de error permite a un atacante remoto explotar el sistema sin necesidad de autenticaci\u00f3n, pudiendo as\u00ed ejecutar c\u00f3digo arbitrario en el servidor vulnerable.<\/p>\n<h2>Productos afectados por CVE-2025-49219<\/h2>\n<p>CVE-2025-49219 afecta a las versiones locales de Apex Central 2019, hasta la compilaci\u00f3n 6017. Seg\u00fan el aviso oficial de Trend Micro, las instancias en la nube (SaaS) no se ven afectadas por esta falla.<\/p>\n<h2>Vector de ataque y gravedad<\/h2>\n<p>La CVE-2025-49219 recibi\u00f3 una puntuaci\u00f3n <a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/cve-y-cvss-para-la-clasificacion-de-vulnerabilidades-de-seguridad-digital\/\">CVSS<\/a> 9.8, considerada cr\u00edtica. El vector de ataque es remoto y no requiere interacci\u00f3n del usuario ni privilegios previos. Esto significa que un actor externo podr\u00eda comprometer el sistema directamente a trav\u00e9s de la interfaz web de Apex Central si este queda expuesto.<\/p>\n<p>El riesgo es especialmente alto en entornos donde la gesti\u00f3n de la seguridad de la red depende directamente de esta plataforma.<\/p>\n<h2>Clasificaci\u00f3n CWE de CVE-2025-49219<\/h2>\n<p>Esta vulnerabilidad est\u00e1 asociada con la categor\u00eda CWE-477: Uso de funci\u00f3n obsoleta. Este tipo de falla ocurre cuando el software utiliza bibliotecas o funciones consideradas inseguras u obsoletas, lo que puede generar un comportamiento inesperado o inseguro durante la ejecuci\u00f3n del c\u00f3digo.<\/p>\n<h2>Actualizaci\u00f3n y mitigaci\u00f3n<\/h2>\n<p>Trend Micro ya ha publicado una soluci\u00f3n. La recomendaci\u00f3n es actualizar inmediatamente el sistema a la compilaci\u00f3n 6018 o superior. El parche se puede aplicar directamente a trav\u00e9s de la consola de administraci\u00f3n de la plataforma.<\/p>\n<p>Adem\u00e1s, se recomienda revisar los registros del sistema para detectar comportamientos an\u00f3malos, aplicar segmentaci\u00f3n de red y restringir el acceso externo a la consola siempre que sea posible. Estas medidas ayudan a reducir la superficie de ataque mientras se parchea el entorno.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2025-49219 es una vulnerabilidad cr\u00edtica en Trend Micro Apex Central, una plataforma utilizada para la gesti\u00f3n centralizada de pol\u00edticas de seguridad en puntos finales y servidores. El problema fue informado por Zero Day Initiative (ZDI) y solo afecta a las versiones locales de la soluci\u00f3n, dejando fuera los entornos SaaS. La falla est\u00e1 relacionada con [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":21449,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019],"tags":[1778],"class_list":["post-21465","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","tag-cve-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"CVE-2025-49219 es una vulnerabilidad cr\u00edtica en Trend Micro Apex Central, una plataforma utilizada para la gesti\u00f3n centralizada de pol\u00edticas de seguridad en puntos finales y servidores. El problema fue informado por Zero Day Initiative (ZDI) y solo afecta a las versiones locales de la soluci\u00f3n, dejando fuera los entornos SaaS. La falla est\u00e1 relacionada con [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-16T14:37:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo\",\"datePublished\":\"2025-07-16T14:37:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/\"},\"wordCount\":380,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg\",\"keywords\":[\"cve\"],\"articleSection\":[\"Gen\u00e9rico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/\",\"name\":\"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg\",\"datePublished\":\"2025-07-16T14:37:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg\",\"width\":928,\"height\":534,\"caption\":\"CVE-2025-49219\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/","og_locale":"es_ES","og_type":"article","og_title":"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo - OSTEC | Seguran\u00e7a digital de resultados","og_description":"CVE-2025-49219 es una vulnerabilidad cr\u00edtica en Trend Micro Apex Central, una plataforma utilizada para la gesti\u00f3n centralizada de pol\u00edticas de seguridad en puntos finales y servidores. El problema fue informado por Zero Day Initiative (ZDI) y solo afecta a las versiones locales de la soluci\u00f3n, dejando fuera los entornos SaaS. La falla est\u00e1 relacionada con [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2025-07-16T14:37:58+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo","datePublished":"2025-07-16T14:37:58+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/"},"wordCount":380,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg","keywords":["cve"],"articleSection":["Gen\u00e9rico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/","url":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/","name":"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg","datePublished":"2025-07-16T14:37:58+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2025\/06\/CVE-2025-49219.jpg","width":928,"height":534,"caption":"CVE-2025-49219"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2025-49219-una-vulnerabilidad-en-trend-micro-apex-central-permite-la-ejecucion-remota-de-codigo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"CVE-2025-49219: Una vulnerabilidad en Trend Micro Apex Central permite la ejecuci\u00f3n remota de c\u00f3digo"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/21465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=21465"}],"version-history":[{"count":5,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/21465\/revisions"}],"predecessor-version":[{"id":21475,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/21465\/revisions\/21475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/21449"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=21465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=21465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=21465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}