Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26216: CWE-94 Improper Control of Generation of Code ('Code Injection') in unclecode Crawl4AI

0
Critical
VulnerabilityCVE-2026-26216cvecve-2026-26216cwe-94
Published: Thu Feb 12 2026 (02/12/2026, 15:31:20 UTC)
Source: CVE Database V5
Vendor/Project: unclecode
Product: Crawl4AI

Description

Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in the allowed builtins, allowing unauthenticated remote attackers to import arbitrary modules and execute system commands. Successful exploitation allows full server compromise, including arbitrary command execution, file read and write access, sensitive data exfiltration, and lateral movement within internal networks.

AI-Powered Analysis

AILast updated: 02/12/2026, 16:03:53 UTC

Technical Analysis

CVE-2026-26216 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) affecting unclecode's Crawl4AI software versions prior to 0.8.0. The vulnerability resides in the /crawl HTTP endpoint, which accepts a hooks parameter that contains Python code. This code is executed directly using Python's exec() function, a highly dangerous practice if input is not strictly sanitized. The vulnerability is exacerbated by the inclusion of the __import__ builtin in the allowed builtins during execution, which permits attackers to import arbitrary Python modules. This capability enables unauthenticated remote attackers to execute arbitrary system commands on the server hosting Crawl4AI. The impact of successful exploitation is severe: attackers gain full control over the server, including the ability to read and write files, exfiltrate sensitive data, and move laterally within the internal network. The vulnerability requires no authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the critical nature and ease of exploitation make it a high priority for remediation. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls or upgrade once patches are released.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. Crawl4AI may be used in data scraping, AI training data collection, or other automated data processing tasks, often involving sensitive or proprietary information. A successful attack could lead to complete server takeover, exposing confidential data, intellectual property, and personally identifiable information (PII) protected under GDPR. The ability to execute arbitrary commands and move laterally within networks increases the risk of widespread compromise, potentially affecting interconnected systems and critical infrastructure. This could result in operational disruption, regulatory penalties, reputational damage, and financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and government are particularly at risk due to the sensitive nature of their data and the criticality of their services. The vulnerability's remote and unauthenticated exploitability means attackers can target exposed Crawl4AI instances directly from the internet, increasing the attack surface and urgency for mitigation.

Mitigation Recommendations

1. Immediate mitigation should include restricting or disabling access to the /crawl endpoint from untrusted networks, ideally limiting it to internal, authenticated users only via network segmentation and firewall rules. 2. Implement strict input validation and sanitization on the hooks parameter to prevent arbitrary code execution; avoid using exec() on user-supplied input. 3. Remove or restrict the use of dangerous builtins such as __import__ in the code execution environment. 4. Monitor network traffic and server logs for unusual activity indicative of exploitation attempts, such as unexpected module imports or command executions. 5. Deploy application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block malicious payloads targeting the vulnerable endpoint. 6. Once available, promptly apply official patches or upgrade to Crawl4AI version 0.8.0 or later, which addresses this vulnerability. 7. Conduct a thorough security review and penetration test of the deployment environment to identify any lateral movement or persistence established by attackers. 8. Educate development teams on secure coding practices to avoid unsafe use of exec() and similar functions in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-11T20:08:07.943Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698df67cc9e1ff5ad8e88716

Added to database: 2/12/2026, 3:49:16 PM

Last enriched: 2/12/2026, 4:03:53 PM

Last updated: 2/12/2026, 4:58:56 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats