{"id":10059,"date":"2025-08-14T22:12:01","date_gmt":"2025-08-14T22:12:01","guid":{"rendered":"https:\/\/savethevideo.net\/blog\/?p=10059"},"modified":"2025-08-14T22:12:02","modified_gmt":"2025-08-14T22:12:02","slug":"cve-2025-29803-explained-threat-profile-and-fixes","status":"publish","type":"post","link":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/","title":{"rendered":"CVE-2025-29803 Explained: Threat Profile and Fixes"},"content":{"rendered":"<p>In the ever-evolving world of cybersecurity, staying ahead of potential threats is critical for maintaining the integrity and safety of digital systems. One such emerging vulnerability that has recently captured the attention of cybersecurity professionals is <strong>CVE-2025-29803<\/strong>. This Common Vulnerabilities and Exposures (CVE) identifier refers to a significant flaw discovered in a widely-used open-source web application framework, and its implications are far-reaching for both businesses and individuals.<\/p>\n<p>This article will provide an in-depth look at <em>CVE-2025-29803<\/em>, explaining what it is, how it operates, who is at risk, and how system administrators and end-users can protect themselves.<\/p>\n<h2>What is CVE-2025-29803?<\/h2>\n<p><strong>CVE-2025-29803<\/strong> is a remote code execution (RCE) vulnerability found in version 4.3.1 of the popular TornadoWeb framework\u2014a lightweight, scalable asynchronous web framework used commonly in Python-based projects. The flaw lies in TornadoWeb&#8217;s improper handling of dynamic URI routing combined with insufficient input validation. An attacker could exploit this flaw by crafting a specially designed request that injects malicious code into the application, which is then executed on the server.<\/p>\n<img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"720\" src=\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2026\/04\/graphs-of-performance-analytics-on-a-laptop-screen-cybersecurity-lab-dashboard-virtual-machine-status-running-online-training-platform-interface.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2026\/04\/graphs-of-performance-analytics-on-a-laptop-screen-cybersecurity-lab-dashboard-virtual-machine-status-running-online-training-platform-interface.jpg 1080w, https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2026\/04\/graphs-of-performance-analytics-on-a-laptop-screen-cybersecurity-lab-dashboard-virtual-machine-status-running-online-training-platform-interface-300x200.jpg 300w, https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2026\/04\/graphs-of-performance-analytics-on-a-laptop-screen-cybersecurity-lab-dashboard-virtual-machine-status-running-online-training-platform-interface-1024x683.jpg 1024w, https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2026\/04\/graphs-of-performance-analytics-on-a-laptop-screen-cybersecurity-lab-dashboard-virtual-machine-status-running-online-training-platform-interface-768x512.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\n<p>By exploiting CVE-2025-29803, a cybercriminal could potentially gain full control over the affected system, install malware, steal sensitive data, or disrupt service entirely. Perhaps the most alarming aspect is that, once inside, attackers can maintain persistence on the compromised system without raising obvious red flags.<\/p>\n<h2>Threat Profile: Who is at Risk?<\/h2>\n<p>This vulnerability predominantly threatens applications and services built using TornadoWeb 4.3.1, especially those that are reachable on public networks or have underconfigured firewalls. Organizations using this framework in internal API ecosystems or web services exposed to the internet are particularly at risk.<\/p>\n<p>The threat level associated with CVE-2025-29803 has been ranked as <strong>Critical<\/strong> by the National Vulnerability Database (NVD), with a CVSS (Common Vulnerability Scoring System) score of 9.8 out of 10. This makes it a high-priority issue that demands immediate attention.<\/p>\n<h3>Key Risk Factors Include:<\/h3>\n<ul>\n<li><strong>Use of TornadoWeb 4.3.1:<\/strong> All applications using this version are susceptible unless patched.<\/li>\n<li><strong>Publicly Exposed APIs:<\/strong> APIs or services open to the internet without proper rate-limiting or IP whitelisting are vulnerable.<\/li>\n<li><strong>Lack of Input Validation:<\/strong> Applications that fail to sanitize user inputs are more likely to be compromised.<\/li>\n<\/ul>\n<img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"720\" src=\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/a-laptop-computer-sitting-on-top-of-a-desk-developer-coding-laptop-audio-waveform-interface-cloud-technology.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/a-laptop-computer-sitting-on-top-of-a-desk-developer-coding-laptop-audio-waveform-interface-cloud-technology.jpg 1080w, https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/a-laptop-computer-sitting-on-top-of-a-desk-developer-coding-laptop-audio-waveform-interface-cloud-technology-300x200.jpg 300w, https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/a-laptop-computer-sitting-on-top-of-a-desk-developer-coding-laptop-audio-waveform-interface-cloud-technology-1024x683.jpg 1024w, https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/a-laptop-computer-sitting-on-top-of-a-desk-developer-coding-laptop-audio-waveform-interface-cloud-technology-768x512.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\n<h2>How Was It Discovered?<\/h2>\n<p>CVE-2025-29803 was initially discovered by a security researcher known as &#8220;TrinityPayload&#8221; during a routine penetration test. A detailed report was later submitted through the responsible disclosure process, and the vendor verified and acknowledged the vulnerability within weeks.<\/p>\n<p>The public disclosure followed in February 2025, along with a technical advisory and proof-of-concept exploit code. It quickly drew attention from both white-hat and black-hat communities alike, prompting widespread discussion and rapid responses across forums and security mailing lists.<\/p>\n<h2>Patching and Fixes<\/h2>\n<p>Fortunately, the maintainers of TornadoWeb acted swiftly. Version 4.3.2, released in early March 2025, patches the vulnerability by adding strict input validation checks and modifying the way dynamic URIs are parsed. Upgrading to this version is the recommended course of action.<\/p>\n<h3>Steps to Secure Your Systems:<\/h3>\n<ol>\n<li><strong>Update Immediately:<\/strong> Upgrade to TornadoWeb 4.3.2 or later versions as soon as possible.<\/li>\n<li><strong>Audit Your Code:<\/strong> Review URI routing handlers and input validation logic across your codebase.<\/li>\n<li><strong>Implement Web Application Firewalls (WAFs):<\/strong> Deploy WAFs capable of filtering suspicious requests related to URI injection patterns.<\/li>\n<li><strong>Monitor Logs:<\/strong> Check application and system logs for signs of abnormal URI requests or unauthorized code execution.<\/li>\n<li><strong>Educate Your Dev Team:<\/strong> Train developers on secure coding practices and the importance of regular dependency updates.<\/li>\n<\/ol>\n<h2>Conclusion<\/h2>\n<p><em>CVE-2025-29803<\/em> serves as another sobering reminder of how even popular and trusted tools can have hidden flaws. With the rise of automated deployment pipelines and interconnected microservices, a single vulnerability like this can cascade into far-reaching damage.<\/p>\n<p>By understanding the threat profile and implementing prompt fixes, including updating libraries and adopting good security hygiene, organizations can stay ahead of malicious actors. The battle against vulnerabilities like CVE-2025-29803 continues, but awareness and action are our best defenses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the ever-evolving world of cybersecurity, staying ahead of potential threats is critical for maintaining the integrity and safety of digital systems. One such emerging vulnerability that has recently captured &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"CVE-2025-29803 Explained: Threat Profile and Fixes\" class=\"read-more button\" href=\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#more-10059\" aria-label=\"Read more about CVE-2025-29803 Explained: Threat Profile and Fixes\">Read more<\/a><\/p>\n","protected":false},"author":88,"featured_media":10036,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[495],"tags":[],"class_list":["post-10059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2025-29803 Explained: Threat Profile and Fixes - Save the Video Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2025-29803 Explained: Threat Profile and Fixes - Save the Video Blog\" \/>\n<meta property=\"og:description\" content=\"In the ever-evolving world of cybersecurity, staying ahead of potential threats is critical for maintaining the integrity and safety of digital systems. One such emerging vulnerability that has recently captured ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/\" \/>\n<meta property=\"og:site_name\" content=\"Save the Video Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-14T22:12:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T22:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"864\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jonathan Dough\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan Dough\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/\"},\"author\":{\"name\":\"Jonathan Dough\",\"@id\":\"https:\/\/savethevideo.net\/blog\/#\/schema\/person\/2fd5bb6675327a328b726eb409570700\"},\"headline\":\"CVE-2025-29803 Explained: Threat Profile and Fixes\",\"datePublished\":\"2025-08-14T22:12:01+00:00\",\"dateModified\":\"2025-08-14T22:12:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/\"},\"wordCount\":657,\"publisher\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/\",\"url\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/\",\"name\":\"CVE-2025-29803 Explained: Threat Profile and Fixes - Save the Video Blog\",\"isPartOf\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg\",\"datePublished\":\"2025-08-14T22:12:01+00:00\",\"dateModified\":\"2025-08-14T22:12:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage\",\"url\":\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg\",\"contentUrl\":\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg\",\"width\":1080,\"height\":864},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/savethevideo.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2025-29803 Explained: Threat Profile and Fixes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/savethevideo.net\/blog\/#website\",\"url\":\"https:\/\/savethevideo.net\/blog\/\",\"name\":\"Save the Video Blog\",\"description\":\"Everything you need to know about videos\",\"publisher\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/savethevideo.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/savethevideo.net\/blog\/#organization\",\"name\":\"Save the Video Blog\",\"url\":\"https:\/\/savethevideo.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/savethevideo.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2021\/02\/cropped-stv-logo.png\",\"contentUrl\":\"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2021\/02\/cropped-stv-logo.png\",\"width\":500,\"height\":119,\"caption\":\"Save the Video Blog\"},\"image\":{\"@id\":\"https:\/\/savethevideo.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/savethevideo.net\/blog\/#\/schema\/person\/2fd5bb6675327a328b726eb409570700\",\"name\":\"Jonathan Dough\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/savethevideo.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9afc32c64534e0fac8123f418680cd8c214b1c82b9a0e765b34eddf7636ede6d?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9afc32c64534e0fac8123f418680cd8c214b1c82b9a0e765b34eddf7636ede6d?s=96&d=monsterid&r=g\",\"caption\":\"Jonathan Dough\"},\"url\":\"https:\/\/savethevideo.net\/blog\/author\/jonathand\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2025-29803 Explained: Threat Profile and Fixes - Save the Video Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2025-29803 Explained: Threat Profile and Fixes - Save the Video Blog","og_description":"In the ever-evolving world of cybersecurity, staying ahead of potential threats is critical for maintaining the integrity and safety of digital systems. One such emerging vulnerability that has recently captured ... Read more","og_url":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/","og_site_name":"Save the Video Blog","article_published_time":"2025-08-14T22:12:01+00:00","article_modified_time":"2025-08-14T22:12:02+00:00","og_image":[{"width":1080,"height":864,"url":"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg","type":"image\/jpeg"}],"author":"Jonathan Dough","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jonathan Dough","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#article","isPartOf":{"@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/"},"author":{"name":"Jonathan Dough","@id":"https:\/\/savethevideo.net\/blog\/#\/schema\/person\/2fd5bb6675327a328b726eb409570700"},"headline":"CVE-2025-29803 Explained: Threat Profile and Fixes","datePublished":"2025-08-14T22:12:01+00:00","dateModified":"2025-08-14T22:12:02+00:00","mainEntityOfPage":{"@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/"},"wordCount":657,"publisher":{"@id":"https:\/\/savethevideo.net\/blog\/#organization"},"image":{"@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/","url":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/","name":"CVE-2025-29803 Explained: Threat Profile and Fixes - Save the Video Blog","isPartOf":{"@id":"https:\/\/savethevideo.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage"},"image":{"@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg","datePublished":"2025-08-14T22:12:01+00:00","dateModified":"2025-08-14T22:12:02+00:00","breadcrumb":{"@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#primaryimage","url":"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg","contentUrl":"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2025\/08\/flat-screen-monitor-turned-on-bitdefender-interface-antivirus-dashboard-cybersecurity-software.jpg","width":1080,"height":864},{"@type":"BreadcrumbList","@id":"https:\/\/savethevideo.net\/blog\/cve-2025-29803-explained-threat-profile-and-fixes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/savethevideo.net\/blog\/"},{"@type":"ListItem","position":2,"name":"CVE-2025-29803 Explained: Threat Profile and Fixes"}]},{"@type":"WebSite","@id":"https:\/\/savethevideo.net\/blog\/#website","url":"https:\/\/savethevideo.net\/blog\/","name":"Save the Video Blog","description":"Everything you need to know about videos","publisher":{"@id":"https:\/\/savethevideo.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/savethevideo.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/savethevideo.net\/blog\/#organization","name":"Save the Video Blog","url":"https:\/\/savethevideo.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/savethevideo.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2021\/02\/cropped-stv-logo.png","contentUrl":"https:\/\/savethevideo.net\/blog\/wp-content\/uploads\/2021\/02\/cropped-stv-logo.png","width":500,"height":119,"caption":"Save the Video Blog"},"image":{"@id":"https:\/\/savethevideo.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/savethevideo.net\/blog\/#\/schema\/person\/2fd5bb6675327a328b726eb409570700","name":"Jonathan Dough","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/savethevideo.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9afc32c64534e0fac8123f418680cd8c214b1c82b9a0e765b34eddf7636ede6d?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9afc32c64534e0fac8123f418680cd8c214b1c82b9a0e765b34eddf7636ede6d?s=96&d=monsterid&r=g","caption":"Jonathan Dough"},"url":"https:\/\/savethevideo.net\/blog\/author\/jonathand\/"}]}},"_links":{"self":[{"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/posts\/10059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/users\/88"}],"replies":[{"embeddable":true,"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/comments?post=10059"}],"version-history":[{"count":1,"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/posts\/10059\/revisions"}],"predecessor-version":[{"id":10068,"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/posts\/10059\/revisions\/10068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/media\/10036"}],"wp:attachment":[{"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/media?parent=10059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/categories?post=10059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/savethevideo.net\/blog\/wp-json\/wp\/v2\/tags?post=10059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}