CVE-2026-26216 PUBLISHED

Crawl4AI < 0.8.0 Docker API Unauthenticated Remote Code Execution via Hooks Parameter

Assigner: VulnCheck
Reserved: 11.02.2026 Published: 12.02.2026 Updated: 12.02.2026

Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The import builtin was included in the allowed builtins, allowing unauthenticated remote attackers to import arbitrary modules and execute system commands. Successful exploitation allows full server compromise, including arbitrary command execution, file read and write access, sensitive data exfiltration, and lateral movement within internal networks.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 10

Product Status

Vendor unclecode
Product Crawl4AI
Versions Default: unaffected
  • affected from 0 to 0.8.0 (excl.)

Credits

  • Neo by ProjectDiscovery (https://neo.projectdiscovery.io) finder

References

Problem Types

  • CWE-94 Improper Control of Generation of Code ('Code Injection') CWE