CVE-2026-26216: CWE-94 Improper Control of Generation of Code ('Code Injection') in unclecode Crawl4AI
Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in the allowed builtins, allowing unauthenticated remote attackers to import arbitrary modules and execute system commands. Successful exploitation allows full server compromise, including arbitrary command execution, file read and write access, sensitive data exfiltration, and lateral movement within internal networks.
AI Analysis
Technical Summary
CVE-2026-26216 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) affecting unclecode's Crawl4AI software versions prior to 0.8.0. The vulnerability resides in the /crawl HTTP endpoint, which accepts a hooks parameter that contains Python code. This code is executed directly using Python's exec() function, a highly dangerous practice if input is not strictly sanitized. The vulnerability is exacerbated by the inclusion of the __import__ builtin in the allowed builtins during execution, which permits attackers to import arbitrary Python modules. This capability enables unauthenticated remote attackers to execute arbitrary system commands on the server hosting Crawl4AI. The impact of successful exploitation is severe: attackers gain full control over the server, including the ability to read and write files, exfiltrate sensitive data, and move laterally within the internal network. The vulnerability requires no authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the critical nature and ease of exploitation make it a high priority for remediation. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls or upgrade once patches are released.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. Crawl4AI may be used in data scraping, AI training data collection, or other automated data processing tasks, often involving sensitive or proprietary information. A successful attack could lead to complete server takeover, exposing confidential data, intellectual property, and personally identifiable information (PII) protected under GDPR. The ability to execute arbitrary commands and move laterally within networks increases the risk of widespread compromise, potentially affecting interconnected systems and critical infrastructure. This could result in operational disruption, regulatory penalties, reputational damage, and financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and government are particularly at risk due to the sensitive nature of their data and the criticality of their services. The vulnerability's remote and unauthenticated exploitability means attackers can target exposed Crawl4AI instances directly from the internet, increasing the attack surface and urgency for mitigation.
Mitigation Recommendations
1. Immediate mitigation should include restricting or disabling access to the /crawl endpoint from untrusted networks, ideally limiting it to internal, authenticated users only via network segmentation and firewall rules. 2. Implement strict input validation and sanitization on the hooks parameter to prevent arbitrary code execution; avoid using exec() on user-supplied input. 3. Remove or restrict the use of dangerous builtins such as __import__ in the code execution environment. 4. Monitor network traffic and server logs for unusual activity indicative of exploitation attempts, such as unexpected module imports or command executions. 5. Deploy application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block malicious payloads targeting the vulnerable endpoint. 6. Once available, promptly apply official patches or upgrade to Crawl4AI version 0.8.0 or later, which addresses this vulnerability. 7. Conduct a thorough security review and penetration test of the deployment environment to identify any lateral movement or persistence established by attackers. 8. Educate development teams on secure coding practices to avoid unsafe use of exec() and similar functions in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2026-26216: CWE-94 Improper Control of Generation of Code ('Code Injection') in unclecode Crawl4AI
Description
Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in the allowed builtins, allowing unauthenticated remote attackers to import arbitrary modules and execute system commands. Successful exploitation allows full server compromise, including arbitrary command execution, file read and write access, sensitive data exfiltration, and lateral movement within internal networks.
AI-Powered Analysis
Technical Analysis
CVE-2026-26216 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) affecting unclecode's Crawl4AI software versions prior to 0.8.0. The vulnerability resides in the /crawl HTTP endpoint, which accepts a hooks parameter that contains Python code. This code is executed directly using Python's exec() function, a highly dangerous practice if input is not strictly sanitized. The vulnerability is exacerbated by the inclusion of the __import__ builtin in the allowed builtins during execution, which permits attackers to import arbitrary Python modules. This capability enables unauthenticated remote attackers to execute arbitrary system commands on the server hosting Crawl4AI. The impact of successful exploitation is severe: attackers gain full control over the server, including the ability to read and write files, exfiltrate sensitive data, and move laterally within the internal network. The vulnerability requires no authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the critical nature and ease of exploitation make it a high priority for remediation. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls or upgrade once patches are released.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. Crawl4AI may be used in data scraping, AI training data collection, or other automated data processing tasks, often involving sensitive or proprietary information. A successful attack could lead to complete server takeover, exposing confidential data, intellectual property, and personally identifiable information (PII) protected under GDPR. The ability to execute arbitrary commands and move laterally within networks increases the risk of widespread compromise, potentially affecting interconnected systems and critical infrastructure. This could result in operational disruption, regulatory penalties, reputational damage, and financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and government are particularly at risk due to the sensitive nature of their data and the criticality of their services. The vulnerability's remote and unauthenticated exploitability means attackers can target exposed Crawl4AI instances directly from the internet, increasing the attack surface and urgency for mitigation.
Mitigation Recommendations
1. Immediate mitigation should include restricting or disabling access to the /crawl endpoint from untrusted networks, ideally limiting it to internal, authenticated users only via network segmentation and firewall rules. 2. Implement strict input validation and sanitization on the hooks parameter to prevent arbitrary code execution; avoid using exec() on user-supplied input. 3. Remove or restrict the use of dangerous builtins such as __import__ in the code execution environment. 4. Monitor network traffic and server logs for unusual activity indicative of exploitation attempts, such as unexpected module imports or command executions. 5. Deploy application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block malicious payloads targeting the vulnerable endpoint. 6. Once available, promptly apply official patches or upgrade to Crawl4AI version 0.8.0 or later, which addresses this vulnerability. 7. Conduct a thorough security review and penetration test of the deployment environment to identify any lateral movement or persistence established by attackers. 8. Educate development teams on secure coding practices to avoid unsafe use of exec() and similar functions in future releases.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-11T20:08:07.943Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698df67cc9e1ff5ad8e88716
Added to database: 2/12/2026, 3:49:16 PM
Last enriched: 2/12/2026, 4:03:53 PM
Last updated: 2/12/2026, 4:58:56 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61880: n/a
CriticalCVE-2025-55210: CWE-270: Privilege Context Switching Error in FreePBX api
LowCVE-2025-69752: n/a
HighCVE-2025-56647: n/a
MediumCVE-2026-26217: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in unclecode Crawl4AI
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.