• HOME
  • MODULAR DS
    • BACKUPS
    • UPDATES
    • SECURITY
    • UPTIME
    • ANALYTICS
    • ACCESS
    • REPORTS
  • IT
    • IT Audit
    • Case Studies
    • Comparisons
    • Compliance
    • Methodologies
    • Tools
    • Training
  • BLOG
Bussines WS

Business Web Strategies

  • HOME
  • MODULAR DS
    • BACKUPS
    • UPDATES
    • SECURITY
    • UPTIME
    • ANALYTICS
    • ACCESS
    • REPORTS
  • IT
    • IT Audit
    • Case Studies
    • Comparisons
    • Compliance
    • Methodologies
    • Tools
    • Training
  • BLOG
No Result
View All Result
  • HOME
  • MODULAR DS
    • BACKUPS
    • UPDATES
    • SECURITY
    • UPTIME
    • ANALYTICS
    • ACCESS
    • REPORTS
  • IT
    • IT Audit
    • Case Studies
    • Comparisons
    • Compliance
    • Methodologies
    • Tools
    • Training
  • BLOG
No Result
View All Result
Business WS
No Result
View All Result
Home Blog

How to audit and secure WordPress REST API endpoints

J.Blanco by J.Blanco
in Blog
0
0
SHARES
0
VIEWS
FacebookXLinkedinPinterestWhatsappEmail

In this article:

  • WordPress REST API Endpoints
  • The Role of IT Audit in WordPress REST API Security
  • Common Vulnerabilities and Threats Targeting WordPress REST API Endpoints
  • Preparing for a WordPress REST API Security Audit
  • Step-by-Step Guide to Auditing WordPress REST API Endpoints
  • Implementing Best Practices to Secure WordPress REST API Endpoints
  • Creating and Securing Custom REST API Endpoints in WordPress
  • Tools and Plugins to Facilitate WordPress REST API Auditing and Security
  • Benefits and Risks of Auditing and Securing WordPress REST API Endpoints
  • Compliance and Reporting in WordPress REST API Security Audits
  • Case Studies and Real-World Examples
  • Common Mistakes and Pitfalls When Auditing and Securing WordPress REST API Endpoints
  • Expert Opinions and Community Insights on WordPress REST API Security
  • Summary and Actionable Checklist for Auditing and Securing WordPress REST API Endpoints
  • References and Further Reading
  • Frequently Asked Questions (FAQs)
Auditing and securing WordPress REST API endpoints is essential to protect your website’s data and functionality from unauthorized access and attacks. This comprehensive guide walks you through understanding, auditing, and safeguarding these endpoints using practical IT audit techniques, security best practices, and compliance measures tailored for WordPress environments.

The WordPress REST API is a powerful interface that allows external applications and developers to interact with your WordPress site’s data and features. However, without proper auditing and security controls, these endpoints can become gateways for attackers to exploit vulnerabilities, access sensitive data, or disrupt services. This article is designed to help IT auditors, cybersecurity professionals, and developers understand how to thoroughly audit and secure WordPress REST API endpoints. We will cover everything from basic concepts and common threats to detailed auditing steps, best practices, tools, compliance considerations, and real-world examples.

Key points covered in this article include

  • Understanding the structure and function of WordPress REST API endpoints
  • The role and objectives of IT audits in API security
  • Common vulnerabilities and threat vectors targeting REST API endpoints
  • Step-by-step auditing procedures and tools
  • Implementing robust security best practices
  • Creating and securing custom REST API endpoints
  • Compliance and reporting essentials
  • Real-world case studies and expert insights

WordPress REST API Endpoints

WordPress REST API endpoints are specific URLs that expose WordPress data and functionality in a structured way, allowing external clients to interact with the website programmatically. These endpoints serve as access points to resources such as posts, users, comments, taxonomies, and custom post types.

Each endpoint corresponds to a route in the API, usually prefixed by /wp-json/, followed by the namespace and resource path. For example, /wp-json/wp/v2/posts accesses posts data.

The REST API supports standard HTTP methods like GET, POST, PUT, and DELETE, which respectively retrieve, create, update, or delete resources. This flexibility makes it a powerful tool for integration but also increases the attack surface if endpoints are not properly secured.

Plugins and themes can register their own custom endpoints, expanding the API’s capabilities but also potentially introducing vulnerabilities if not audited carefully.

Because endpoints expose data and allow actions, they can be vulnerable to unauthorized access, injection attacks, or abuse if authentication, authorization, and input validation are not enforced correctly.

Understanding how these endpoints work and their role in WordPress architecture is the first step toward effective auditing and securing.

Endpoints typically fall into categories

  • Core endpoints Managed by WordPress core for standard resources like posts, users, and media.
  • Plugin endpoints Added by plugins to extend functionality, e.g., WooCommerce API routes.
  • Theme endpoints Occasionally themes add endpoints for custom features.

Each type requires careful review during audits to ensure no sensitive data leaks or unauthorized actions are possible.

The Role of IT Audit in WordPress REST API Security

IT Audit in the context of WordPress REST API involves systematically examining API endpoints to identify security weaknesses, verify compliance with policies and regulations, and ensure data protection.

The main objectives of auditing REST API endpoints include

  • Detecting vulnerabilities that could allow unauthorized access or data breaches
  • Ensuring authentication and authorization mechanisms are properly implemented
  • Verifying input validation to prevent injection and scripting attacks
  • Confirming logging and monitoring are in place for accountability
  • Assessing compliance with relevant regulations such as GDPR, HIPAA, or PCI DSS

Key audit principles guiding this process are completeness (covering all endpoints), accuracy (correctly identifying issues), reliability (repeatable and verifiable findings), and compliance (aligning with legal and organizational standards).

Regulatory frameworks often require organizations to protect personal and sensitive data accessible through APIs. For example, GDPR mandates strict data protection and breach notification requirements, which apply to WordPress sites handling EU user data.

Through auditing, organizations can maintain a secure, scalable, and compliant WordPress environment that protects user trust and business continuity.

IT auditors play a critical role in bridging technical security controls with organizational risk management and compliance efforts.

How to audit and secure wordpress rest api endpoints

 

Advertisement

Common Vulnerabilities and Threats Targeting WordPress REST API Endpoints

WordPress REST API endpoints face a variety of threats that can compromise website security if not properly mitigated.

Some of the most common vulnerabilities include

How to create custom audit logs for WordPress activity trackingHow to create custom audit logs for WordPress activity tracking
  • Unauthorized access and privilege escalation Attackers exploiting weak authentication or misconfigured permissions to access or modify data they shouldn’t.
  • Injection attacks SQL Injection or Cross-Site Scripting (XSS) attacks via unsanitized inputs that can corrupt data or execute malicious scripts.
  • Cross-Site Request Forgery (CSRF) Tricks authenticated users into performing unintended actions by exploiting session trust.
  • Denial of Service (DoS) and brute force attacks Overwhelming the API with excessive requests to disrupt service availability.
  • Data exposure Overly permissive endpoints revealing sensitive information to unauthenticated or unauthorized users.
  • Exploitation of outdated plugins and themes Vulnerabilities in third-party code accessible via API routes.
  • Risks from third-party integrations External data sources or applications introducing security gaps.

Understanding these threats helps auditors focus on critical areas during security assessments and prioritize remediation.

Attackers often scan for exposed endpoints like /wp-json/ to discover potential entry points.

Misconfigured CORS policies or missing CSRF protections can also open doors to cross-origin attacks.

Rate limiting absence can allow attackers to brute force credentials or flood the API.

Properly securing REST API endpoints requires a layered approach addressing all these vulnerabilities.

Preparing for a WordPress REST API Security Audit

Before starting an audit, preparation is key to ensure a thorough and efficient process.

First, gather the necessary tools such as security scanners (e.g., WPScan), audit logging plugins (e.g., REST API Log), and API testing tools (e.g., Postman, OWASP ZAP).

Next, identify all active REST API endpoints, including those added by plugins and themes. This can be done by querying the /wp-json/ root endpoint or using discovery tools.

Map user roles and permissions to understand who has access to which API resources. This helps in assessing authorization controls.

Define the audit scope and objectives aligned with your organization’s security policies and compliance requirements. Decide which endpoints, user roles, and attack vectors to focus on.

Set up a secure testing environment, ideally a staging site mirroring production, to avoid disruptions or data loss during testing.

Document the environment details, including WordPress version, installed plugins, themes, and server configuration.

Establish communication channels with development and operations teams to coordinate audit activities and remediation efforts.

Having a clear plan and the right tools will make the audit process more reliable and actionable.

How to audit and secure wordpress rest api endpoints

 

Step-by-Step Guide to Auditing WordPress REST API Endpoints

Discovery and Enumeration of Endpoints

Start by listing all available REST API endpoints. The root endpoint /wp-json/ provides a JSON object listing namespaces and routes.

Use tools or plugins that automate endpoint discovery, such as WPScan or REST API Log.

Pay special attention to custom endpoints registered by plugins or themes, as these often lack thorough security reviews.

Document each endpoint’s URL, supported HTTP methods, and expected parameters.

Check for any undocumented or hidden endpoints that might expose sensitive functionality.

How to prevent brute force attacks on WordPress login pagesHow to prevent brute force attacks on WordPress login pages

Understanding the full API surface is crucial to avoid missing vulnerabilities.

Authentication and Authorization Assessment

Verify that all endpoints requiring data modification or sensitive information enforce authentication.

Common authentication methods include Basic Authentication, OAuth, and JWT tokens. Check their correct implementation and security.

Test whether authorization controls are in place by attempting actions with users of different roles and privileges.

Ensure the principle of least privilege is enforced—users should only access what they need.

Look for endpoints that allow unauthenticated access to sensitive data.

Check for use of WordPress capability checks before executing actions.

Test for potential privilege escalation vulnerabilities.

Input Validation and Sanitization Review

Examine how inputs to API endpoints are validated and sanitized.

Inputs must be cleansed using WordPress core functions like sanitize_text_field(), esc_html(), and prepared statements for database queries.

Check for injection vulnerabilities such as SQL Injection and XSS.

Review code or plugin documentation to confirm input handling best practices.

Test endpoints with malicious payloads to verify protections.

Proper input validation is a cornerstone of API security.

Rate Limiting and Abuse Prevention Controls

Assess if the API implements rate limiting or throttling to prevent abuse and DoS attacks.

Check server and plugin configurations for request limits per IP or user.

Test by sending rapid repeated requests and observe if the server blocks or slows down responses.

Evaluate tools like Wordfence or custom middleware that provide rate limiting.

Rate limiting helps maintain service availability and deters brute force attacks.

Cross-Origin Resource Sharing (CORS) and Security Middleware

Review CORS policies to ensure only trusted origins can access the API.

Guide to auditing WordPress database security settingsGuide to auditing WordPress database security settings

Misconfigured CORS can lead to unauthorized cross-origin requests and data leaks.

Check for CSRF protections such as nonces in API requests.

Verify security headers like X-Frame-Options to prevent clickjacking.

Ensure middleware layers are active to enforce these protections.

These controls protect users and the site from cross-site attacks.

Logging and Monitoring Practices

Confirm that audit logs capture detailed API usage, including user identity, endpoint accessed, request parameters, and timestamps.

Evaluate integration with monitoring tools for real-time alerting on suspicious activity.

Logs should be tamper-resistant and stored securely.

Regular review of logs helps detect intrusion attempts early.

Logging is vital for forensic analysis and compliance.

Infrastructure and Environment Security

Evaluate server hardening measures such as firewall rules, disabled unnecessary services, and secure configurations.

Check network segmentation to isolate critical systems.

Verify HTTPS enforcement with valid SSL/TLS certificates to protect data in transit.

Ensure web server configurations prevent information leakage.

Infrastructure security complements application-level protections.

Advertisement

Implementing Best Practices to Secure WordPress REST API Endpoints

Strong authentication and authorization are fundamental. Use secure methods like OAuth or JWT tokens and always verify user capabilities before allowing actions.

Nonces and secure tokens protect against CSRF attacks by validating request origins.

Limit endpoint exposure by restricting access to authenticated and authorized users only. Disable or restrict unnecessary endpoints.

Keep WordPress core, plugins, and themes updated to patch known vulnerabilities promptly.

Store API keys and tokens securely, preferably outside the webroot or in environment variables.

Apply the principle of least privilege when assigning API permissions, granting only what is necessary.

Use security plugins designed to protect REST API endpoints, such as Disable WP REST API or REST API Toolbox, to manage access controls.

Configure strict CORS policies and security headers to prevent cross-origin attacks.

Implement rate limiting and IP whitelisting to mitigate abuse and DoS attacks.

Use prepared statements and escape all output to prevent injection attacks.

Continuously monitor API activity and set up automated alerts for suspicious behavior.

These best practices create a layered defense that significantly reduces risk.

Creating and Securing Custom REST API Endpoints in WordPress

Custom endpoints are useful when default API routes don’t meet your needs, such as exposing specialized data or functionality.

Use the register_rest_route() function to create custom endpoints, specifying the namespace, route, supported HTTP methods, and callback functions.

Secure custom endpoints by enforcing authentication and capability checks within the callback.

Validate and sanitize all input parameters rigorously using WordPress functions.

Sanitize output to prevent data leaks and XSS vulnerabilities.

Consider performance by implementing caching, pagination, and throttling to handle large data sets and high traffic.

Example snippet

register_rest_route('myplugin/v1', '/data/', array(
  'methods' => 'GET',
  'callback' => 'myplugin_get_data',
  'permission_callback' => function () {
    return current_user_can('read');
  }
));

Secure custom endpoint development requires attention to detail and adherence to security best practices.

Tools and Plugins to Facilitate WordPress REST API Auditing and Security

Several tools and plugins can help streamline auditing and securing WordPress REST API endpoints

  • WPScan A security scanner that detects vulnerabilities in WordPress core, plugins, and themes.
  • REST API Log Logs all REST API requests for auditing and monitoring purposes.
  • Query Monitor Helps debug and analyze API requests and database queries.
  • Postman A popular API testing tool for manual and automated endpoint testing.
  • OWASP ZAP An open-source penetration testing tool for detecting API vulnerabilities.
  • Disable WP REST API Plugin to restrict REST API access to authenticated users.
  • REST API Toolbox Provides fine-grained control over REST API permissions.

Enterprise-grade hosting providers often include Web Application Firewalls (WAF), DDoS protection, and server hardening features that enhance API security.

Integrating audit logging and monitoring solutions is essential for ongoing security assurance.

Advertisement


Benefits and Risks of Auditing and Securing WordPress REST API Endpoints


Benefits

Protects sensitive data from unauthorized access and breaches.

Ensures compliance with regulations like GDPR, HIPAA, and PCI DSS.

Helps detect and remediate vulnerabilities before exploitation.

Supports a layered security approach with authentication, authorization, and input validation.

Enables continuous monitoring and logging for early threat detection.

Improves trust and business continuity by securing API integrations.


Risks

Exposed endpoints can lead to unauthorized data access or privilege escalation.

Injection attacks like SQLi and XSS can compromise site integrity if input validation is weak.

Lack of rate limiting may allow DoS or brute force attacks, disrupting service availability.

Misconfigured CORS or missing CSRF protections can enable cross-origin attacks.

Overlooking custom or third-party endpoints may leave security gaps.

Poor logging and monitoring reduce visibility into attacks and delay response.

Auditing and securing WordPress REST API endpoints is critical to protect data and maintain compliance. While it offers powerful integration capabilities, it also introduces risks if not properly managed. A thorough, layered security approach combined with continuous monitoring and regular audits ensures a resilient WordPress environment that safeguards user trust and business operations.

Compliance and Reporting in WordPress REST API Security Audits

Audit findings must be aligned with compliance requirements such as GDPR, HIPAA, or PCI DSS, depending on the data handled.

Document vulnerabilities, risks, and remediation steps clearly in detailed audit reports.

Use automated compliance tools to assist with continuous auditing and policy enforcement.

Communicate results effectively to both technical teams and management, highlighting risks and recommended actions.

Establish incident response plans that include detection, containment, and recovery procedures for API security breaches.

Compliance reporting supports accountability and regulatory adherence.

Case Studies and Real-World Examples

Example 1 An audit revealed unauthorized access to user data through an exposed custom endpoint. Remediation involved adding authentication and capability checks, plus disabling unnecessary routes.

Example 2 After a data breach, a WordPress site implemented rate limiting and switched to OAuth authentication for API access, significantly reducing abuse.

Example 3 A high-traffic e-commerce site secured its REST API by applying IP whitelisting and caching strategies, improving performance and security.

These cases highlight the importance of comprehensive auditing and layered security controls.

Lessons learned include the need for continuous monitoring, regular updates, and collaboration between developers and security teams.

Advertisement

Common Mistakes and Pitfalls When Auditing and Securing WordPress REST API Endpoints

Auditors and developers often overlook custom and third-party endpoints, leaving gaps in security coverage.

Relying solely on default WordPress security without additional controls can expose sensitive data.

Ignoring regular updates and patch management increases vulnerability to known exploits.

Poor management of API keys and tokens can lead to credential leaks.

Insufficient logging and monitoring reduce visibility into attacks.

Misconfigured CORS policies may cause unintended data exposure.

Underestimating the importance of rate limiting leaves the API open to abuse.

Avoiding these pitfalls is critical to maintaining a secure WordPress REST API environment.

Expert Opinions and Community Insights on WordPress REST API Security

Leading cybersecurity experts emphasize that securing REST API endpoints is no longer optional but essential for WordPress sites handling sensitive data.

WordPress developers advocate for strict capability checks and minimal endpoint exposure as best practices.

IT auditors recommend integrating automated scanning and continuous monitoring to detect emerging threats.

Community forums and security groups share evolving strategies for defending against new attack vectors.

Emerging trends include API security automation, zero-trust models, and enhanced logging standards.

Staying engaged with the community and expert insights helps organizations adapt and strengthen their API security posture.

Summary and Actionable Checklist for Auditing and Securing WordPress REST API Endpoints

  • Identify and document all REST API endpoints, including custom and third-party routes.
  • Verify authentication and authorization mechanisms enforce least privilege access.
  • Review input validation and sanitization to prevent injection attacks.
  • Assess rate limiting and abuse prevention controls.
  • Check CORS policies and security middleware for cross-origin and CSRF protections.
  • Ensure comprehensive logging and real-time monitoring are in place.
  • Evaluate infrastructure security, including HTTPS enforcement and server hardening.
  • Keep WordPress core, plugins, and themes updated regularly.
  • Securely manage API keys and tokens.
  • Document audit findings and align with compliance requirements.
  • Establish incident response plans for API security incidents.
  • Continuously review and improve security measures.

References and Further Reading

  • Protect WordPress RESTful API Auto-Discover Endpoint – AAM Portal ↗
  • WordPress REST API Overview – Sanders Design ↗
  • A Door Ajar to Your Data: The WordPress REST API – Sirvelia ↗
  • WordPress Security Best Practices for Enterprises – rtCamp ↗
  • Best Practices for Securing API Endpoints – LoadForge ↗
  • Unlocking the Power of WordPress REST API – Vipe Studio ↗
  • Top WordPress Security Hacks 2025 – Deknows ↗
  • API Security Management Best Practices – Timspark ↗
  • Common REST API Security Vulnerabilities – Beagle Security ↗

Frequently Asked Questions (FAQs)

What is the WordPress REST API and why is it important to secure it?

The WordPress REST API is a set of endpoints that allow external applications to interact with WordPress data and features. Securing it is crucial to prevent unauthorized access, data breaches, and attacks that could compromise your website.

How can I discover all REST API endpoints on my WordPress site?

You can discover endpoints by accessing the /wp-json/ root endpoint, which lists all available routes. Tools like WPScan or REST API Log plugins can also help enumerate endpoints.

What are the best authentication methods for securing REST API endpoints?

OAuth and JWT tokens are considered secure methods. Basic Authentication is less secure and should be avoided in production. Always enforce capability checks and use nonces to protect requests.

How do I prevent unauthorized access to sensitive API data?

Implement strict authentication and authorization controls, limit endpoint exposure, apply the principle of least privilege, and use security plugins to manage access.

What tools can help me audit and monitor REST API security?

Tools like WPScan, REST API Log, Postman, and OWASP ZAP assist in auditing and monitoring. Security plugins like Disable WP REST API enhance protection.

How often should I perform security audits on my WordPress REST API?

Regular audits are recommended, at least quarterly or after significant changes such as plugin updates, new endpoint additions, or security incidents.

What are common signs of REST API abuse or attacks?

Signs include unusual spikes in API requests, repeated failed authentication attempts, unexpected data changes, and alerts from monitoring tools.

How do I secure custom REST API endpoints I develop?

Use register_rest_route() with proper authentication and capability checks, validate and sanitize inputs and outputs, and implement rate limiting and caching.


What do you think about the security of your WordPress REST API endpoints? Have you encountered any challenges auditing or securing them? How would you like to improve your API security practices? Share your thoughts, questions, or experiences in the comments below!

¡Haz clic para puntuar esta entrada!
(Votos: 0 Promedio: 0)
Modular DS Modular DS Modular DS

Tags: ACCESSAPIASSESSMENTAUDITCOMPLIANCECONTROLDATAENDPOINTSITPROTECTIONREPORTRESTREVIEWSECURITYTESTINGVULNERABILITYWORDPRESS
ShareTweetSharePinSendSend
Modular DS Modular DS Modular DS
Previous Post

ISO 27001 Compliance Audit: Key Controls

Next Post

Legal and Regulatory Updates for IT Auditors

J.Blanco

J.Blanco

I'm J.Blanco, an IT expert with over 20 years of experience. My specialty is website maintenance, particularly with WordPress. I've worked with numerous clients across various industries, helping them keep their websites secure, up-to-date, and performing optimally. My passion lies in leveraging technology to help businesses thrive in the digital world.

Related Posts

WordPress security audit checklist
Blog

How to perform a WordPress audit after a plugin vulnerability disclosure

by J.Blanco
0
Cybersecurity audit with laptop
Methodologies

Penetration Testing Audit: PTES Framework Explained

by J.Blanco
0
Next Post
Gavel

Legal and Regulatory Updates for IT Auditors

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I accept the Terms and Conditions and the Privacy Policy and Legal Notice.

OUR RECOMMENDATIONS

Plugin security audit checklist
Blog

Checklist for auditing WordPress plugins for vulnerabilities

by J.Blanco
0
0

Discover the ultimate Checklist for auditing WordPress plugins for vulnerabilities! Protect your site with 10 proven steps—are your plugins truly...

Read more

POPULAR POSTS

    YOU MAY ALSO LIKE

    WordPress file change alert icon

    How to monitor file changes in WordPress for early threat detection

    0
    WordPress security audit checklist

    How to audit WordPress for spam and comment injection vulnerabilities

    4
    SOX compliance checklist and audit

    SOX Audit: Financial Sector Compliance Guide

    0
    Modular DS Modular DS Modular DS
    ©businesswebstrategies.com

    • Legal notice
    • Privacy policy
    • Cookie policy
    • Sitemap
    • Categories

    No Result
    View All Result
    • HOME
    • MODULAR DS
      • BACKUPS
      • UPDATES
      • SECURITY
      • UPTIME
      • ANALYTICS
      • ACCESS
      • REPORTS
    • IT
      • IT Audit
      • Case Studies
      • Comparisons
      • Compliance
      • Methodologies
      • Tools
      • Training
    • BLOG

    Gestionar el consentimiento de las cookies
    Para ofrecer las mejores experiencias, utilizamos tecnologías como las cookies para almacenar y/o acceder a la información del dispositivo. El consentimiento de estas tecnologías nos permitirá procesar datos como el comportamiento de navegación o las identificaciones únicas en este sitio. No consentir o retirar el consentimiento, puede afectar negativamente a ciertas características y funciones.
    Funcional Always active
    El almacenamiento o acceso técnico es estrictamente necesario para el propósito legítimo de permitir el uso de un servicio específico explícitamente solicitado por el abonado o usuario, o con el único propósito de llevar a cabo la transmisión de una comunicación a través de una red de comunicaciones electrónicas.
    Preferencias
    El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
    Estadísticas
    El almacenamiento o acceso técnico que es utilizado exclusivamente con fines estadísticos. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
    Marketing
    El almacenamiento o acceso técnico es necesario para crear perfiles de usuario para enviar publicidad, o para rastrear al usuario en una web o en varias web con fines de marketing similares.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    Ver preferencias
    {title} {title} {title}