GHSA-5882-5RX9-XGXP

Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

Alon Barad
Alon Barad
Software Engineer

Jan 17, 2026·5 min read·27 visits

Executive Summary (TL;DR)

Crawl4AI, a web scraper for LLMs, exposed an unauthenticated API endpoint that accepted custom Python code for 'hooks'. The developers attempted to sandbox this using `exec()` but accidentally allowed `__import__`. Attackers can send a JSON payload to the `/crawl` endpoint to execute system commands as root inside the Docker container, potentially stealing API keys or pivoting within the network. Fixed in version 0.8.0.

A critical Remote Code Execution (RCE) vulnerability in Crawl4AI's Docker deployment allows unauthenticated attackers to execute arbitrary Python code via the `hooks` parameter, bypassing a flimsy sandbox.

Technical Appendix

CVSS Score
10.0/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Affected Systems

Crawl4AI Docker deployments < 0.8.0Any system exposing the Crawl4AI /crawl endpoint to untrusted networks

Affected Versions Detail

Product
Affected Versions
Fixed Version
Crawl4AI
Crawl4AI (Open Source)
< 0.8.00.8.0
AttributeDetail
Vulnerability TypeRemote Code Execution (RCE)
CWE IDCWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code)
CVSS Score10.0 (Critical)
Attack VectorNetwork (API)
AuthenticationNone
Affected ComponentDocker API / Hook Manager
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. 'eval').

Vulnerability Timeline

Vulnerability Disclosed
2025-01-16
Version 0.8.0 Released with Fix
2025-01-16
PoC Published by ProjectDiscovery
2025-01-16

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.