Crawl4AI Has Local File Inclusion in Docker API via file:// URLs
Critical severity
GitHub Reviewed
Published
Jan 16, 2026
in
unclecode/crawl4ai
•
Updated Feb 12, 2026
Description
Published to the GitHub Advisory Database
Jan 16, 2026
Reviewed
Jan 16, 2026
Published by the National Vulnerability Database
Feb 12, 2026
Last updated
Feb 12, 2026
A local file inclusion vulnerability exists in the Crawl4AI Docker API. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing attackers to read arbitrary files from the server filesystem.
Attack Vector:
Impact
An unauthenticated attacker can:
Workarounds
References