Description
Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in the allowed builtins, allowing unauthenticated remote attackers to import arbitrary modules and execute system commands. Successful exploitation allows full server compromise, including arbitrary command execution, file read and write access, sensitive data exfiltration, and lateral movement within internal networks.
Published: 2026-02-12
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the /crawl endpoint of Crawl4AI deployments built with versions before 0.8.0. The endpoint accepts a hooks parameter that is evaluated using Python's exec(). The allowed built‑in functions include __import__, enabling an unauthenticated attacker to import any module and execute arbitrary system commands. This flaw is classified as code injection (CWE‑94) and can lead to full server compromise, including reading and writing files, exfiltrating sensitive data, and lateral movement across internal networks.

Affected Systems

Products from unclecode, the Crawl4AI software, are affected whenever the deployed version is older than 0.8.0. No specific patch version other than 0.8.0 or later provides a fix, and the issue has been acknowledged by the vendor.

Risk and Exploitability

The CVSS score of 10.0 indicates maximum severity. The EPSS score is reported as less than 1 %, implying a very low likelihood of a widespread exploit at this time, yet the attack vector is open to anyone who can reach the Docker API. The vulnerability is not currently listed in CISA’s KEV catalog. Successful exploitation requires no authentication, thus the risk to exposed installations is high.

Generated by OpenCVE AI on April 17, 2026 at 20:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Crawl4AI to version 0.8.0 or later immediately.
  • Restrict external network access to the Docker API, especially the /crawl endpoint, when an upgrade is not yet possible.
  • Apply container hardening practices: run the container as a non‑privileged user, disable unnecessary services, and monitor for anomalous network activity.

Generated by OpenCVE AI on April 17, 2026 at 20:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5882-5rx9-xgxp Crawl4AI is Vulnerable to Remote Code Execution in Docker API via Hooks Parameter
History

Fri, 20 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Kidocode
Kidocode crawl4ai
CPEs cpe:2.3:a:kidocode:crawl4ai:*:*:*:*:*:*:*:*
Vendors & Products Kidocode
Kidocode crawl4ai

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Unclecode
Unclecode crawl4ai
Vendors & Products Unclecode
Unclecode crawl4ai

Thu, 12 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 16:15:00 +0000


Thu, 12 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in the allowed builtins, allowing unauthenticated remote attackers to import arbitrary modules and execute system commands. Successful exploitation allows full server compromise, including arbitrary command execution, file read and write access, sensitive data exfiltration, and lateral movement within internal networks.
Title Crawl4AI < 0.8.0 Docker API Unauthenticated Remote Code Execution via Hooks Parameter
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Kidocode Crawl4ai
Unclecode Crawl4ai
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-12T21:01:12.851Z

Reserved: 2026-02-11T20:08:07.943Z

Link: CVE-2026-26216

cve-icon Vulnrichment

Updated: 2026-02-12T21:01:10.267Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-12T16:16:17.447

Modified: 2026-02-20T16:52:49.807

Link: CVE-2026-26216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:15:26Z

Weaknesses