Local File Inclusion in Crawl4AI Docker API by Uncle Code
CVE-2026-26217
9.2CRITICAL
What is CVE-2026-26217?
Crawl4AI versions before 0.8.0 are vulnerable to a local file inclusion flaw within the Docker API deployment. This vulnerability is manifested through endpoints such as /execute_js, /screenshot, /pdf, and /html, which improperly process file:// URLs. As a result, unauthenticated remote attackers may exploit this flaw to access arbitrary files from the server's filesystem. This could lead to exposure of sensitive information such as /etc/passwd, /etc/shadow, and environmental variables. Such access can unveil critical credentials, API keys, and even internal application structure, making it imperative for users to upgrade to the patched version.
Affected Version(s)
Crawl4AI 0 < 0.8.0
References
CVSS V4
Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Neo by ProjectDiscovery (https://neo.projectdiscovery.io)
