A local file inclusion vulnerability exists in the Crawl4AI Docker API. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing attackers to read arbitrary files from the server filesystem.
Attack Vector:
POST /execute_js
{
"url": "file:///etc/passwd",
"scripts": ["document.body.innerText"]
}
Impact
An unauthenticated attacker can: - Read sensitive files (/etc/passwd, /etc/shadow, application configs) - Access environment variables via /proc/self/environ - Discover internal application structure - Potentially read credentials and API keys
Workarounds
{
"github_reviewed_at": "2026-01-16T20:58:51Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-22"
],
"nvd_published_at": "2026-02-12T16:16:17Z",
"severity": "CRITICAL"
}