logo

Database

Lack of data validation - Path Traversal In crawl4ai

Description

Crawl4AI Has Local File Inclusion in Docker API via file:// URLs A local file inclusion vulnerability exists in the Crawl4AI Docker API. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing attackers to read arbitrary files from the server filesystem.

Attack Vector:

POST /execute_js
{
    "url": "file:///etc/passwd",
    "scripts": ["document.body.innerText"]
}

Impact

An unauthenticated attacker can:

    Read sensitive files (/etc/passwd, /etc/shadow, application configs)

    Access environment variables via /proc/self/environ

    Discover internal application structure

    Potentially read credentials and API keys

Workarounds

    Disable the Docker API

    Add authentication to the API

    Use network-level filtering

Mitigation

Update Impact

Minimal update. May introduce new vulnerabilities or breaking changes.

Ecosystem
Package
Affected version
Patched versions

Does your application use this vulnerable software?

During the free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.