{"id":99194,"date":"2022-08-01T19:47:12","date_gmt":"2022-08-01T23:47:12","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/support\/?p=99194"},"modified":"2022-08-01T19:47:12","modified_gmt":"2022-08-01T23:47:12","slug":"cyberpanel-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/","title":{"rendered":"CyberPanel Security Vulnerabilities"},"content":{"rendered":"<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg\" alt=\"CyberPanel security vulnerabilities\" class=\"wp-image-99193\" srcset=\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg 1024w, https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-300x158.jpg 300w, https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-768x403.jpg 768w, https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities.jpg 1200w\" sizes=\"auto, (min-width: 1360px) 876px, (min-width: 960px) calc(61.58vw + 51px), calc(100vw - 80px)\" \/><\/figure>\n\n\n\n<p>It is always a good idea to investigate how secure an uncommon software is before installing it. This applies to <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-vps-intro\/\">CyberPanel<\/a> as it is one of the least popular Linux control panels we\u2019ve covered. In this article, we\u2019ll discuss some important CyberPanel security concerns and solutions.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#risks\">Cybersecurity Risks<\/a><ul><li><a href=\"#cve\">Common Vulnerabilities and Exposures (CVEs)<\/a><\/li><\/ul><\/li><li><a href=\"#features\">CyberPanel Security Features<\/a><ul><li><a href=\"#integrations\">CyberPanel Security Integrations<\/a><\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"risks\">Cybersecurity Risks<\/h2>\n\n\n\n<p>CyberPanel is free open-source software (FOSS). Anyone can download and audit the source code to submit bug fixes or develop malware targeting the application. CyberPanel developers may have times when they focus more on their paid, Enterprise version than the free edition. This isn\u2019t fear mongering, just important info to keep in mind.<\/p>\n\n\n\n<p>We\u2019ve found many bugs while creating CyberPanel content. Luckily, we were able to find workarounds to mitigate them. But for those unaware of those mitigation techniques, those bugs can easily be manipulated for malicious purposes. The easiest ways to track bugs:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Recently reported <a href=\"https:\/\/github.com\/usmannasir\/cyberpanel\/issues\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub issues<\/a><\/li><li><a href=\"https:\/\/github.com\/usmannasir\/cyberpanel\/commits\/v2.3.1\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub commits<\/a> to compare changes in source code<\/li><li>Changelogs thread in <a href=\"https:\/\/community.cyberpanel.net\/t\/change-logs\/161\" target=\"_blank\" rel=\"noreferrer noopener\">official forum<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cve\">Common Vulnerabilities and Exposures (CVEs)<\/h3>\n\n\n\n<p>Popular software is generally targeted more often by cyber attackers. One of the best ways to quantify known vulnerabilities is by searching for the app in the National Vulnerability Database (NVD). Each verified vulnerability is given a Common Vulnerabilities and Exposures (CVE) identifier.<\/p>\n\n\n\n<p>As of July 2022, there is only a single unresolved CyberPanel CVE and it only applies to version 1.8.4 (current version is 2.4). Submitted in 2019, CVE-2019-13056 states that the lack of cross-site request forgery (CSRF) protection allows a cyber attacker to edit the administrator\u2019s user credentials. But again, this CVE has since been negated through multiple software upgrades. The same applies to a remote code execution (RCE) flaw reported for CyberPanel version 2.1.<\/p>\n\n\n\n<p>The lead CyberPanel developer stated in a Reddit post that the Rack911 security company regularly audits the software to mitigate vulnerabilities. This should provide some peace of mind that there likely aren\u2019t many major security flaws present. Just remember that you should still apply best cybersecurity practices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"features\">CyberPanel Security Features<\/h2>\n\n\n\n<p>CyberPanel free and enterprise versions use the LiteSpeed free and enterprise versions respectively. The most notable LiteSpeed security feature is how easily you can implement HTTP\/3. Just force a website to use a valid SSL certificate and open UDP port 443 in your web application firewall (WAF). Done.<\/p>\n\n\n\n<p>Most security DNS records are built as TXT records:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sender Policy Framework (SPF) authenticates which IP addresses can send email for a domain<\/li><li>Domain-based Message Authentication Reporting and Conformance (DMARC) enforces SPF and blocks illegitimate emails<\/li><li><a href=\"https:\/\/www.inmotionhosting.com\/support\/product-guides\/cloud-server\/bimi-record-on-cloud-server\/\">Brand Indicators for Message Identification (BIMI)<\/a> authenticates legitimate email with a special logo image in select email hosting platforms<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"integrations\">CyberPanel Security Integrations<\/h3>\n\n\n\n<p>CyberPanel has graphical interfaces for some popular security applications.<\/p>\n\n\n\n<p>ConfigServer Security &amp; Firewall (CSF) is capable of stateful packet inspection (SPI), closing network ports, brute force login protection, and more. It is a popular, great most-in-one security solution.<\/p>\n\n\n\n<p>ModSecurity is a signature-based firewall able to block cross-site scripting (XSS) and other various code injection attacks. This is a must-have for anyone running dynamically built sites with PHP and databases.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.imunify360.com\/antivirus\/\" target=\"_blank\" rel=\"noreferrer noopener\">ImunifyAV<\/a> is a virus scanner that can be enhanced with CSF. The premium Imunify360 version adds patching, backup functionality, and additional security features.<\/p>\n\n\n\n<p>Use best security practices, regardless of what you have installed. And regularly review security logs for ways to improve your security posture. Let us know below if you still have questions about securing your <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/\">CyberPanel VPS<\/a>.<\/p>\n\n\n<div class=\"jumbotron\"><p>No matter if you're a developer, system administrator, or simply a fan of SSH and command line, InMotion's <a href=\"https:\/\/www.inmotionhosting.com\/cloud-vps\">Cloud Hosting plans<\/a> provide a fast, scalable environment that is budget-friendly.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>It is always a good idea to investigate how secure an uncommon software is before installing it. This applies to CyberPanel as it is one of the least popular Linux control panels we\u2019ve covered. In this article, we\u2019ll discuss some important CyberPanel security concerns and solutions. Cybersecurity Risks Common Vulnerabilities and Exposures (CVEs) CyberPanel Security<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\"> Read More ><\/a><\/p>\n","protected":false},"author":57014,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4539],"tags":[],"class_list":["post-99194","post","type-post","status-publish","format-standard","hentry","category-cyberpanel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CyberPanel Security Vulnerabilities | InMotion Hosting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberPanel Security Vulnerabilities | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"It is always a good idea to investigate how secure an uncommon software is before installing it. This applies to CyberPanel as it is one of the least popular Linux control panels we\u2019ve covered. In this article, we\u2019ll discuss some important CyberPanel security concerns and solutions. Cybersecurity Risks Common Vulnerabilities and Exposures (CVEs) CyberPanel Security Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Support Center\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T23:47:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg\" \/>\n<meta name=\"author\" content=\"InMotion Hosting Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InMotionHosting\" \/>\n<meta name=\"twitter:site\" content=\"@InMotionHosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\"},\"author\":{\"name\":\"InMotion Hosting Contributor\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\"},\"headline\":\"CyberPanel Security Vulnerabilities\",\"datePublished\":\"2022-08-01T23:47:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\"},\"wordCount\":588,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg\",\"articleSection\":[\"CyberPanel\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\",\"name\":\"CyberPanel Security Vulnerabilities | InMotion Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg\",\"datePublished\":\"2022-08-01T23:47:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities.jpg\",\"width\":1200,\"height\":630,\"caption\":\"CyberPanel security vulnerabilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inmotionhosting.com\/support\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberPanel Security Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"name\":\"InMotion Hosting Support Center\",\"description\":\"Web Hosting Support &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\",\"name\":\"InMotion Hosting\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"width\":696,\"height\":696,\"caption\":\"InMotion Hosting\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/inmotionhosting\/\",\"https:\/\/x.com\/InMotionHosting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\",\"name\":\"InMotion Hosting Contributor\",\"description\":\"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/inmotion-hosting\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting\"],\"url\":\"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyberPanel Security Vulnerabilities | InMotion Hosting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"CyberPanel Security Vulnerabilities | InMotion Hosting","og_description":"It is always a good idea to investigate how secure an uncommon software is before installing it. This applies to CyberPanel as it is one of the least popular Linux control panels we\u2019ve covered. In this article, we\u2019ll discuss some important CyberPanel security concerns and solutions. Cybersecurity Risks Common Vulnerabilities and Exposures (CVEs) CyberPanel Security Read More >","og_url":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/","og_site_name":"InMotion Hosting Support Center","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting\/","article_published_time":"2022-08-01T23:47:12+00:00","og_image":[{"url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg","type":"","width":"","height":""}],"author":"InMotion Hosting Contributor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InMotionHosting","twitter_site":"@InMotionHosting","twitter_misc":{"Written by":"InMotion Hosting Contributor","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/"},"author":{"name":"InMotion Hosting Contributor","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644"},"headline":"CyberPanel Security Vulnerabilities","datePublished":"2022-08-01T23:47:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/"},"wordCount":588,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg","articleSection":["CyberPanel"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/","url":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/","name":"CyberPanel Security Vulnerabilities | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities-1024x538.jpg","datePublished":"2022-08-01T23:47:12+00:00","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2022\/08\/cyberpanel-security-vulnerabilities.jpg","width":1200,"height":630,"caption":"CyberPanel security vulnerabilities"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/support\/edu\/cyberpanel\/cyberpanel-security-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/support\/"},{"@type":"ListItem","position":2,"name":"CyberPanel Security Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/support\/#website","url":"https:\/\/www.inmotionhosting.com\/support\/","name":"InMotion Hosting Support Center","description":"Web Hosting Support &amp; Tutorials","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/support\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/support\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","width":696,"height":696,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting\/","https:\/\/x.com\/InMotionHosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644","name":"InMotion Hosting Contributor","description":"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!","sameAs":["https:\/\/www.linkedin.com\/company\/inmotion-hosting\/","https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting"],"url":"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":null,"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/99194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/users\/57014"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/comments?post=99194"}],"version-history":[{"count":5,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/99194\/revisions"}],"predecessor-version":[{"id":99199,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/99194\/revisions\/99199"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/media?parent=99194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/categories?post=99194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/tags?post=99194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}