{"id":26105,"date":"2025-03-21T09:47:55","date_gmt":"2025-03-21T09:47:55","guid":{"rendered":"https:\/\/twproject.com\/blog\/?p=26105"},"modified":"2025-03-21T09:47:57","modified_gmt":"2025-03-21T09:47:57","slug":"vulnerability-in-apache-tomcat-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/","title":{"rendered":"Vulnerability in Apache Tomcat &#8211; What you need to know"},"content":{"rendered":"\n<p>On 10 March 2025, a serious vulnerability was disclosed in certain versions of the <strong>Tomcat <\/strong>web-server, developed by the <strong>Apache Software Foundation<\/strong>.<\/p>\n\n\n\n<p>This vulnerability was named <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24813\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-24813<\/a><\/strong> and the Tomcat versions affected are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>9.x<\/strong>, from version 9.0.0-M1 to 9.0.98<\/li><li><strong>10.x<\/strong>, from version 10.1.0-M1 to 10.1.34<\/li><li><strong>11.x<\/strong>, from version 11.0.0-M1 to 11.0.2<\/li><\/ul>\n\n\n\n<p><strong>Twproject<\/strong>, when installed via the executable file <strong><a href=\"https:\/\/twproject.com\/on-your-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">downloadable from the site<\/a><\/strong>, uses Apache Tomcat in its 9.0.46 version, thus <strong>potentially affected by the problem<\/strong>.<\/p>\n\n\n\n<div class=\"table-of-content\">\n<h5>CONTENT<\/h5>\n<ul>\n<li><a href=\"#what\">What is the vulnerability CVE-2025-24813<\/a><\/li>\n<li><a href=\"#know\">What Twproject users need to know<\/a><\/li>\n<li><a href=\"#final\">Final remarks<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<p><a name=\"what\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the vulnerability CVE-2025-24813<\/h2>\n\n\n\n<p>This vulnerability consists of a <strong>Remote Code Execution<\/strong> (<strong>RCE<\/strong>) coupled with an Information disclosure.<\/p>\n\n\n\n<p>This means that a potential attacker would be able to execute arbitrary code and thus hack into the affected system.<\/p>\n\n\n\n<p>As stated on the <strong><a href=\"https:\/\/tomcat.apache.org\/security-9.html\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability page<\/a><\/strong>, this vulnerability is only dangerous and exploitable for an attack if five different conditions are met.<\/p>\n\n\n\n<p>The most important of these conditions is that Tomcat&#8217;s DefaultServlet must state \u2018<em>writes enabled for the default servlet (disabled by default)<\/em>\u2019: in other words, writing for the <em>servlet <\/em>must be <strong>explicitly enabled<\/strong>, as it is disabled by default.<\/p>\n\n\n\n<p>The standard Twproject installer is also disabled by default, so there is no danger in this case.<\/p>\n\n\n\n<p><a name=\"know\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Twproject users need to know<\/h2>\n\n\n\n<p>As we have seen, for those who installed Twproject without having applied any changes to the <strong>configuration files<\/strong>, there is no danger.<\/p>\n\n\n\n<p>The situation is different for those who had installed Twproject using their <strong>own Apache Tomcat<\/strong> of one of the versions affected by the vulnerability.<\/p>\n\n\n\n<p>To ensure that you have not exposed your server to an attack, it is good practice to follow the steps below.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">1. Locate the file<\/h5>\n\n\n\n<p>The DefaultServlet is implemented in the class org.apache.catalina.servlets.DefaultServlet and is used to serve static files or provide directory listing.<\/p>\n\n\n\n<p>The management of its properties is delegated to the <strong>web.xml<\/strong> file, located in Tomcat&#8217;s <em>conf <\/em>folder (in which all configuration files are located).<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2. Check configuration<\/h5>\n\n\n\n<p>The default configuration of the DefaultServlet is as follows:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\n&amp;lt;servlet&gt;\n        &amp;lt;servlet-name&gt;default&amp;lt;\/servlet-name&gt;\n        &amp;lt;servlet-class&gt;org.apache.catalina.servlets.DefaultServlet&amp;lt;\/servlet-class&gt;\n        &amp;lt;init-param&gt;\n            &amp;lt;param-name&gt;debug&amp;lt;\/param-name&gt;\n            &amp;lt;param-value&gt;0&amp;lt;\/param-value&gt;\n        &amp;lt;\/init-param&gt;\n        &amp;lt;init-param&gt;\n            &amp;lt;param-name&gt;listings&amp;lt;\/param-name&gt;\n            &amp;lt;param-value&gt;false&amp;lt;\/param-value&gt;\n        &amp;lt;\/init-param&gt;\n        &amp;lt;load-on-startup&gt;1&amp;lt;\/load-on-startup&gt;\n    &amp;lt;\/servlet&gt;\n<\/pre><\/div>\n\n\n<p><\/p>\n\n\n\n<p>The parameter enabling the ability to write on the server is \u2018<strong>readonly<\/strong>\u2019 with the value \u2018<strong>false<\/strong>\u2019.<\/p>\n\n\n\n<p>And so a configuration that exposes the server to <strong>malicious attacks<\/strong> should be as follows:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\n    &amp;lt;init-param&gt;\n        &amp;lt;param-name&gt;readonly&amp;lt;\/param-name&gt;\n        &amp;lt;param-value&gt;false&amp;lt;\/param-value&gt;\n    &amp;lt;\/init-param&gt;\n<\/pre><\/div>\n\n\n<h5 class=\"wp-block-heading\">3. Intervene if necessary<\/h5>\n\n\n\n<p>If, therefore, the parameter has been specified and its value is \u2018<strong>false<\/strong>\u2019, it is essential to set it to \u2018<strong>true<\/strong>\u2019 in order to disable the writing of the DefaultServlet.<\/p>\n\n\n\n<p>Alternatively, it is possible to upgrade <strong>Apache Tomcat<\/strong> to a version other than those listed above.<\/p>\n\n\n\n<p>If, however, the parameter is not present in the file, there is no problem: the default value applies!<\/p>\n\n\n\n<p><strong>Please note<\/strong>: there may be more than one web.xml file, depending on the server architecture, so it is a good idea to check them all!<\/p>\n\n\n\n<p><a name=\"final\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final remarks<\/h2>\n\n\n\n<p>We hope that we have provided all the information needed to reassure our users and instruct them properly in case action is needed.<\/p>\n\n\n\n<p>If you need more support, please do not hesitate to contact us through<strong><a href=\"https:\/\/twproject.com\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\"> our channels<\/a><\/strong>.<\/p>\n\n\n\n<p>For more on this topic:<\/p>\n\n\n\n<p><a href=\"https:\/\/tomcat.apache.org\/security-9.html\">https:\/\/tomcat.apache.org\/security-9.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24813\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24813<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cisecurity.org\/advisory\/a-vulnerability-in-apache-tomcat-could-allow-for-remote-code-execution_2025-027\">https:\/\/www.cisecurity.org\/advisory\/a-vulnerability-in-apache-tomcat-could-allow-for-remote-code-execution_2025-027<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 10 March 2025, a serious vulnerability was disclosed in certain versions of the Tomcat web-server, developed by the Apache Software Foundation. This vulnerability was named CVE-2025-24813 and the Tomcat versions affected are: 9.x, from version 9.0.0-M1 to 9.0.98 10.x, from version 10.1.0-M1 to 10.1.34 11.x, from version 11.0.0-M1 to 11.0.2 Twproject, when installed via &hellip; <a href=\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Vulnerability in Apache Tomcat &#8211; What you need to know&#8221;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":26099,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_body_class":"","_custom_post_class":"","footnotes":""},"categories":[1,52],"tags":[],"class_list":["post-26105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-releases"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability in Apache Tomcat - What you need to know - Twproject.com<\/title>\n<meta name=\"description\" content=\"What Twproject users need to know about the vulnerability found in Apache Tomcat: a quick guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability in Apache Tomcat - What you need to know - Twproject.com\" \/>\n<meta property=\"og:description\" content=\"What Twproject users need to know about the vulnerability found in Apache Tomcat: a quick guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Twproject.com\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-21T09:47:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T09:47:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Silvia Randaccio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Silvia Randaccio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\"},\"author\":{\"name\":\"Silvia Randaccio\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27\"},\"headline\":\"Vulnerability in Apache Tomcat &#8211; What you need to know\",\"datePublished\":\"2025-03-21T09:47:55+00:00\",\"dateModified\":\"2025-03-21T09:47:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\"},\"wordCount\":537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/twproject.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"articleSection\":[\"News\",\"Product updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\",\"url\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\",\"name\":\"Vulnerability in Apache Tomcat - What you need to know - Twproject.com\",\"isPartOf\":{\"@id\":\"https:\/\/twproject.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"datePublished\":\"2025-03-21T09:47:55+00:00\",\"dateModified\":\"2025-03-21T09:47:57+00:00\",\"description\":\"What Twproject users need to know about the vulnerability found in Apache Tomcat: a quick guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"contentUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"width\":800,\"height\":500,\"caption\":\"vulnerability Apache Tomcat Twproject\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/twproject.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability in Apache Tomcat &#8211; What you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/twproject.com\/blog\/#website\",\"url\":\"https:\/\/twproject.com\/blog\/\",\"name\":\"Twproject.com\",\"description\":\"Twproject is a full featured web based project management software that gives you full visibility and control over your projects.Twproject is also a time tracking software, a bug tracking software, a project planning software.\",\"publisher\":{\"@id\":\"https:\/\/twproject.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/twproject.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/twproject.com\/blog\/#organization\",\"name\":\"Twproject - Project Management Software\",\"url\":\"https:\/\/twproject.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png\",\"contentUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png\",\"width\":331,\"height\":110,\"caption\":\"Twproject - Project Management Software\"},\"image\":{\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27\",\"name\":\"Silvia Randaccio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g\",\"caption\":\"Silvia Randaccio\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability in Apache Tomcat - What you need to know - Twproject.com","description":"What Twproject users need to know about the vulnerability found in Apache Tomcat: a quick guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability in Apache Tomcat - What you need to know - Twproject.com","og_description":"What Twproject users need to know about the vulnerability found in Apache Tomcat: a quick guide.","og_url":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/","og_site_name":"Twproject.com","article_published_time":"2025-03-21T09:47:55+00:00","article_modified_time":"2025-03-21T09:47:57+00:00","og_image":[{"width":800,"height":500,"url":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","type":"image\/png"}],"author":"Silvia Randaccio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Silvia Randaccio","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/"},"author":{"name":"Silvia Randaccio","@id":"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27"},"headline":"Vulnerability in Apache Tomcat &#8211; What you need to know","datePublished":"2025-03-21T09:47:55+00:00","dateModified":"2025-03-21T09:47:57+00:00","mainEntityOfPage":{"@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/"},"wordCount":537,"commentCount":0,"publisher":{"@id":"https:\/\/twproject.com\/blog\/#organization"},"image":{"@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","articleSection":["News","Product updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/","url":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/","name":"Vulnerability in Apache Tomcat - What you need to know - Twproject.com","isPartOf":{"@id":"https:\/\/twproject.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","datePublished":"2025-03-21T09:47:55+00:00","dateModified":"2025-03-21T09:47:57+00:00","description":"What Twproject users need to know about the vulnerability found in Apache Tomcat: a quick guide.","breadcrumb":{"@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#primaryimage","url":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","contentUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","width":800,"height":500,"caption":"vulnerability Apache Tomcat Twproject"},{"@type":"BreadcrumbList","@id":"https:\/\/twproject.com\/blog\/vulnerability-in-apache-tomcat-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/twproject.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Vulnerability in Apache Tomcat &#8211; What you need to know"}]},{"@type":"WebSite","@id":"https:\/\/twproject.com\/blog\/#website","url":"https:\/\/twproject.com\/blog\/","name":"Twproject.com","description":"Twproject is a full featured web based project management software that gives you full visibility and control over your projects.Twproject is also a time tracking software, a bug tracking software, a project planning software.","publisher":{"@id":"https:\/\/twproject.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/twproject.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/twproject.com\/blog\/#organization","name":"Twproject - Project Management Software","url":"https:\/\/twproject.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png","contentUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png","width":331,"height":110,"caption":"Twproject - Project Management Software"},"image":{"@id":"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27","name":"Silvia Randaccio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/twproject.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g","caption":"Silvia Randaccio"}}]}},"_links":{"self":[{"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/posts\/26105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/comments?post=26105"}],"version-history":[{"count":2,"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/posts\/26105\/revisions"}],"predecessor-version":[{"id":26111,"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/posts\/26105\/revisions\/26111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/media\/26099"}],"wp:attachment":[{"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/media?parent=26105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/categories?post=26105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/twproject.com\/blog\/wp-json\/wp\/v2\/tags?post=26105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}