Local File Inclusion in Crawl4AI Docker API by Uncle Code
CVE-2026-26217

9.2CRITICAL

Key Information:

Vendor

Unclecode

Status
Vendor
CVE Published:
12 February 2026

What is CVE-2026-26217?

Crawl4AI versions before 0.8.0 are vulnerable to a local file inclusion flaw within the Docker API deployment. This vulnerability is manifested through endpoints such as /execute_js, /screenshot, /pdf, and /html, which improperly process file:// URLs. As a result, unauthenticated remote attackers may exploit this flaw to access arbitrary files from the server's filesystem. This could lead to exposure of sensitive information such as /etc/passwd, /etc/shadow, and environmental variables. Such access can unveil critical credentials, API keys, and even internal application structure, making it imperative for users to upgrade to the patched version.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Crawl4AI 0 < 0.8.0

References

CVSS V4

Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Neo by ProjectDiscovery (https://neo.projectdiscovery.io)
.