{"id":2497,"date":"2026-04-14T22:05:13","date_gmt":"2026-04-14T22:05:13","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/"},"modified":"2026-04-14T22:05:13","modified_gmt":"2026-04-14T22:05:13","slug":"patch-tuesday-april-2026-edition","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/","title":{"rendered":"Patch Tuesday, April 2026 Edition"},"content":{"rendered":"<div>\n<p><strong>Microsoft<\/strong> today pushed software updates to fix a staggering 167 security vulnerabilities in its <strong>Windows<\/strong> operating systems and related software, including a <strong>SharePoint Server<\/strong> zero-day and a publicly disclosed weakness in <strong>Windows Defender<\/strong> dubbed \u201c<strong>BlueHammer<\/strong>.\u201d Separately, <strong>Google Chrome<\/strong> fixed its fourth zero-day of 2026, and an emergency update for <strong>Adobe Reader<\/strong> nixes an actively exploited flaw that can lead to remote code execution.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-56287 aligncenter\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"A picture of a windows laptop in its updating stage, saying do not turn off the computer. \" width=\"749\" height=\"527\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\"><\/p>\n<p>Redmond warns that attackers are already targeting <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-32201\" target=\"_blank\" rel=\"noopener\">CVE-2026-32201<\/a>, a vulnerability in Microsoft SharePoint Server that allows attackers to spoof trusted content or interfaces over a network.<\/p>\n<p><strong>Mike Walters<\/strong>, president and co-founder of <strong>Action1<\/strong>, said CVE-2026-32201 can be used to deceive employees, partners, or customers by presenting falsified information within trusted SharePoint environments.<\/p>\n<p>\u201cThis CVE can enable phishing attacks, unauthorized data manipulation, or social engineering campaigns that lead to further compromise,\u201d Walters said. \u201cThe presence of active exploitation significantly increases organizational risk.\u201d<\/p>\n<p>This flaw drops alongside a separate SQL Server remote code execution vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-33120\" target=\"_blank\" rel=\"noopener\">CVE-2026-33120<\/a>), notes <strong>Ryan Braunstein<\/strong>, manager of Security and IT at <strong>Automox<\/strong>.<\/p>\n<p>\u201cOne bug allows an attacker to get into your SQL instance from the network,\u201d Braundstein said. \u201cThe other lets someone already inside promote themselves to full control.\u201d<\/p>\n<p>Microsoft also addressed BlueHammer (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-33825\" target=\"_blank\" rel=\"noopener\">CVE-2026-33825<\/a>), a privilege escalation bug in Windows Defender. According to BleepingComputer, the researcher who discovered the flaw <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit\/\" target=\"_blank\" rel=\"noopener\">published exploit code for it<\/a> after notifying Microsoft and growing exasperated with their response. <strong>Will Dormann<\/strong>, senior principal vulnerability analyst at <strong>Tharros<\/strong>, says he <a href=\"https:\/\/infosec.exchange\/@wdormann\/116404516592597593\" target=\"_blank\" rel=\"noopener\">confirmed<\/a> that the public BlueHammer exploit code no longer works after installing today\u2019s patches.<span id=\"more-73440\"><\/span><\/p>\n<p><strong>Satnam Narang<\/strong>, senior staff research engineer at <strong>Tenable<\/strong>, said April marks the second-biggest Patch Tuesday ever for Microsoft. Narang also said there are indications that a zero-day flaw Adobe patched in an emergency update on April 11 \u2014 <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb26-43.html\" target=\"_blank\" rel=\"noopener\">CVE-2026-34621<\/a> \u2014 has seen active exploitation since at least November 2025.<\/p>\n<p><strong>Adam Barnett<\/strong>, lead software engineer at <strong>Rapid7<\/strong>, called the patch total from Microsoft today \u201ca new record in that category\u201d because it includes nearly 60 browser vulnerabilities. Barnett said it might be tempting to imagine that this sudden spike was tied to the buzz around the announcement a week ago today of <a href=\"https:\/\/www.anthropic.com\/glasswing\" target=\"_blank\" rel=\"noopener\">Project Glasswing<\/a> \u2014 a much-hyped but still unreleased new AI capability from Anthropic that is reportedly quite good at finding bugs in a vast array of software.<\/p>\n<p>But he notes that <strong>Microsoft Edge<\/strong> is based on the Chromium engine, and the Chromium maintainers acknowledge a wide range of researchers for the vulnerabilities which Microsoft republished last Friday.<\/p>\n<p>\u201cA safe conclusion is that this increase in volume is driven by ever-expanding AI capabilities,\u201d Barnett said. \u201cWe should expect to see further increases in vulnerability reporting volume as the impact of AI models extend further, both in terms of capability and availability.\u201d<\/p>\n<p>Finally, no matter what browser you use to surf the web, it\u2019s important to completely close out and restart the browser periodically. This is really easy to put off (especially if you have a bajillion tabs open at any time) but it\u2019s the only way to ensure that any available updates get installed. For example, a Google Chrome update released earlier this month fixed 21 security holes, including the high-severity zero-day flaw <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-5281\" target=\"_blank\" rel=\"noopener\">CVE-2026-5281<\/a>.<\/p>\n<p>For a clickable, per-patch breakdown, check out the <strong>SANS Internet Storm Center<\/strong> <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft%20Patch%20Tuesday%20April%202026.\/32898\/\" target=\"_blank\" rel=\"noopener\">Patch Tuesday roundup<\/a>. Running into problems applying any of these updates? Leave a note about it in the comments below and there\u2019s a decent chance someone here will pipe in with a solution.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed \u201cBlueHammer.\u201d Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[1001,1002,1003,1004,1005,1006,1007,1008,90,502,143,1009,1010,1011,197,1012,198,176,177,1013],"tags":[91],"class_list":["post-2497","post","type-post","status-publish","format-standard","hentry","category-action1","category-adobe-reader","category-automox","category-bluehammer","category-cve-2026-32201","category-cve-2026-33120","category-cve-2026-33825","category-cve-2026-34621","category-cybersecurity","category-google-chrome","category-latest-warnings","category-mike-walters","category-patch-tuesday-april-2026","category-ryan-braunstein","category-satnam-narang","category-sharepoint-server","category-tenable","category-the-coming-storm","category-time-to-patch","category-will-dormann","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Patch Tuesday, April 2026 Edition - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday, April 2026 Edition - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed \u201cBlueHammer.\u201d Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-14T22:05:13+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Patch Tuesday, April 2026 Edition\",\"datePublished\":\"2026-04-14T22:05:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/\"},\"wordCount\":577,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Action1\",\"adobe reader\",\"Automox\",\"BlueHammer\",\"CVE-2026-32201\",\"CVE-2026-33120\",\"CVE-2026-33825\",\"CVE-2026-34621\",\"Cybersecurity\",\"Google Chrome\",\"Latest Warnings\",\"Mike Walters\",\"Patch Tuesday April 2026\",\"Ryan Braunstein\",\"Satnam Narang\",\"SharePoint Server\",\"Tenable\",\"The Coming Storm\",\"Time to Patch\",\"Will Dormann\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/\",\"name\":\"Patch Tuesday, April 2026 Edition - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\",\"datePublished\":\"2026-04-14T22:05:13+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage\",\"url\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\",\"contentUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday, April 2026 Edition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Patch Tuesday, April 2026 Edition - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/","og_locale":"en_US","og_type":"article","og_title":"Patch Tuesday, April 2026 Edition - Imperative Business Ventures Limited","og_description":"Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed \u201cBlueHammer.\u201d Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-04-14T22:05:13+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Patch Tuesday, April 2026 Edition","datePublished":"2026-04-14T22:05:13+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/"},"wordCount":577,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage"},"thumbnailUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png","keywords":["Cybersecurity"],"articleSection":["Action1","adobe reader","Automox","BlueHammer","CVE-2026-32201","CVE-2026-33120","CVE-2026-33825","CVE-2026-34621","Cybersecurity","Google Chrome","Latest Warnings","Mike Walters","Patch Tuesday April 2026","Ryan Braunstein","Satnam Narang","SharePoint Server","Tenable","The Coming Storm","Time to Patch","Will Dormann"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/","name":"Patch Tuesday, April 2026 Edition - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage"},"thumbnailUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png","datePublished":"2026-04-14T22:05:13+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#primaryimage","url":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png","contentUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/patch-tuesday-april-2026-edition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Patch Tuesday, April 2026 Edition"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2497"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2497\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}