Lack of data validation - Path Traversal In crawl4ai
Description
Crawl4AI Has Local File Inclusion in Docker API via file:// URLs A local file inclusion vulnerability exists in the Crawl4AI Docker API. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing attackers to read arbitrary files from the server filesystem.
Attack Vector:
POST /execute_js { "url": "file:///etc/passwd", "scripts": ["document.body.innerText"] }
Impact
An unauthenticated attacker can:
Read sensitive files (/etc/passwd, /etc/shadow, application configs)
Access environment variables via /proc/self/environ
Discover internal application structure
Potentially read credentials and API keys
Workarounds
Disable the Docker API
Add authentication to the API
Use network-level filtering
Mitigation
Update Impact
Minimal update. May introduce new vulnerabilities or breaking changes.
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
pip | crawl4ai | 0.8.0 |
Aliases
Does your application use this vulnerable software?
During the free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.