Remote Code Execution Vulnerability in Crawl4AI Docker API Deployment
CVE-2026-26216
What is CVE-2026-26216?
Crawl4AI versions earlier than 0.8.0 include a security flaw in the Docker API deployment that allows for remote code execution. Specifically, the /crawl endpoint permits a hooks parameter that executes supplied Python code through the built-in exec() function. The presence of import in the list of allowed built-ins poses a significant threat, enabling unauthenticated remote attackers to import arbitrary Python modules and run system commands. This vulnerability can lead to severe implications, including complete server takeover, arbitrary command execution, unauthorized file access, sensitive data leakage, and potential lateral movement within the internal network infrastructure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Crawl4AI 0 < 0.8.0
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
