VYPR
Critical severityNVD Advisory· Published Feb 12, 2026· Updated Feb 12, 2026

Crawl4AI < 0.8.0 Docker API Local File Inclusion via file URL Handling

CVE-2026-26217

Description

Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in the Docker API deployment. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing unauthenticated remote attackers to read arbitrary files from the server filesystem. An attacker can access sensitive files such as /etc/passwd, /etc/shadow, application configuration files, and environment variables via /proc/self/environ, potentially exposing credentials, API keys, and internal application structure.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Crawl4AI Docker API before v0.8.0 allows unauthenticated remote file inclusion via file:// URLs in multiple endpoints.

Vulnerability

Overview Crawl4AI versions prior to 0.8.0 contain a local file inclusion (LFI) vulnerability in the Docker API deployment. The endpoints /execute_js, /screenshot, /pdf, and /html accept file:// URLs, allowing an attacker to read arbitrary files from the server filesystem [2][3][4].

Exploitation

An unauthenticated remote attacker can craft a request to any of the affected endpoints with a file:// URL pointing to a target file, such as file:///etc/passwd. No authentication or special privileges are required, as the Docker API is often exposed without proper access controls [3][4].

Impact

Successful exploitation enables reading sensitive files including /etc/passwd, /etc/shadow, application configuration files, and environment variables via /proc/self/environ. This can expose credentials, API keys, and internal application structure, potentially leading to further compromise [2].

Mitigation

The vulnerability is fixed in Crawl4AI version 0.8.0, which blocks file:// URLs by validating allowed URL schemes (only http://, https://, and raw: are permitted). Users should upgrade immediately. If immediate upgrade is not possible, the Python library may be used directly for local file processing as a workaround [2][3][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Crawl4AIPyPI
< 0.8.00.8.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.