Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26217: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in unclecode Crawl4AI

0
Critical
VulnerabilityCVE-2026-26217cvecve-2026-26217cwe-22
Published: Thu Feb 12 2026 (02/12/2026, 15:33:27 UTC)
Source: CVE Database V5
Vendor/Project: unclecode
Product: Crawl4AI

Description

Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in the Docker API deployment. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing unauthenticated remote attackers to read arbitrary files from the server filesystem. An attacker can access sensitive files such as /etc/passwd, /etc/shadow, application configuration files, and environment variables via /proc/self/environ, potentially exposing credentials, API keys, and internal application structure.

AI-Powered Analysis

AILast updated: 02/12/2026, 16:03:34 UTC

Technical Analysis

CVE-2026-26217 is a path traversal vulnerability classified under CWE-22 affecting unclecode's Crawl4AI product versions prior to 0.8.0. The flaw exists in the Docker API deployment of Crawl4AI, specifically in the endpoints /execute_js, /screenshot, /pdf, and /html, which accept file:// URLs without proper validation or restriction. This allows an unauthenticated remote attacker to perform local file inclusion (LFI) attacks by crafting requests that read arbitrary files from the server's filesystem. Critical files such as /etc/passwd and /etc/shadow, which contain user account information and password hashes, can be accessed, along with application configuration files and environment variables exposed via /proc/self/environ. These environment variables may contain sensitive data like API keys and credentials, which can be leveraged for further attacks or lateral movement. The vulnerability has a CVSS 4.0 base score of 9.2, reflecting its critical severity due to network attack vector, no required privileges or user interaction, and high impact on confidentiality. No patches or fixes are listed yet, and no known exploits have been reported in the wild, but the risk remains high given the ease of exploitation and potential data exposure. Crawl4AI is used in AI-related data crawling and processing, often deployed in containerized environments, increasing the attack surface if Docker API endpoints are exposed. This vulnerability highlights the importance of strict input validation and endpoint access control in containerized AI applications.

Potential Impact

The impact of CVE-2026-26217 on European organizations can be severe, especially for those leveraging Crawl4AI in AI data processing pipelines or research environments. Unauthorized access to sensitive system files can lead to credential theft, enabling attackers to escalate privileges or move laterally within networks. Exposure of environment variables and configuration files may reveal API keys and secrets, compromising other integrated systems and cloud services. This can result in data breaches, intellectual property theft, and disruption of AI services. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on AI tools are at heightened risk. Additionally, the vulnerability could undermine trust in AI deployments and lead to regulatory compliance issues under GDPR if personal data is exposed. The lack of authentication and user interaction requirements means attackers can exploit the vulnerability remotely and at scale, increasing the likelihood of automated attacks. The use of Docker containers is widespread in European tech environments, so the attack surface is significant. Without timely mitigation, this vulnerability could facilitate espionage, sabotage, or ransomware attacks targeting AI infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-26217, European organizations should immediately upgrade Crawl4AI to version 0.8.0 or later once available, as this version addresses the vulnerability. Until a patch is applied, restrict network access to the vulnerable Docker API endpoints (/execute_js, /screenshot, /pdf, /html) by implementing firewall rules or network segmentation to limit exposure to trusted internal users only. Employ strict input validation and sanitization on all file URL parameters to prevent file:// scheme usage or path traversal sequences. Monitor logs for suspicious requests targeting these endpoints to detect potential exploitation attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to block malicious file path requests. Review and rotate any credentials or API keys that may have been exposed if exploitation is suspected. Conduct thorough security audits of container configurations to ensure Docker APIs are not unnecessarily exposed to external networks. Finally, raise awareness among development and DevOps teams about secure coding practices related to file handling and container security to prevent similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-11T20:08:07.944Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698df67cc9e1ff5ad8e8871a

Added to database: 2/12/2026, 3:49:16 PM

Last enriched: 2/12/2026, 4:03:34 PM

Last updated: 2/12/2026, 4:49:48 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats