{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "fixed": "0.8.0"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "a5354f267aeeb793bf26e6566a89aa8f1f33809e"
            }
          ],
          "repo": "https://github.com/unclecode/crawl4ai",
          "type": "GIT"
        }
      ]
    }
  ],
  "aliases": [
    "GHSA-vx9w-5cx4-9796"
  ],
  "details": "Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in the Docker API deployment. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing unauthenticated remote attackers to read arbitrary files from the server filesystem. An attacker can access sensitive files such as /etc/passwd, /etc/shadow, application configuration files, and environment variables via /proc/self/environ, potentially exposing credentials, API keys, and internal application structure.",
  "id": "CVE-2026-26217",
  "modified": "2026-03-14T13:47:42.054056295Z",
  "published": "2026-02-12T16:16:17.620Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/unclecode/crawl4ai/blob/main/docs/blog/release-v0.8.0.md"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/unclecode/crawl4ai/security/advisories/GHSA-vx9w-5cx4-9796"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.vulncheck.com/advisories/crawl4ai-docker-api-local-file-inclusion-via-file-url-handling"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    }
  ]
}