PyPI: crawl4ai

CVE-2026-26217

Safety vulnerability ID: SFTY-20260116-79054

Safety legacy ID: pyup.io-84606

Affected versions of the crawl4ai package are vulnerable to Path Traversal due to insufficient validation of user-supplied URL schemes. The Crawl4AI Docker API endpoints /execute_js, /screenshot, /pdf, and /html accept a user-controlled url value that can be set to a file:// URI, allowing filesystem paths to be resolved and read without restriction.

Created at: Mar 4, 2026Updated at: Mar 4, 2026

Overview

Crawl4AI Has Local File Inclusion in Docker API via file:// URLs

Advisory

Affected versions of the crawl4ai package are vulnerable to Path Traversal due to insufficient validation of user-supplied URL schemes. The Crawl4AI Docker API endpoints /execute_js, /screenshot, /pdf, and /html accept a user-controlled url value that can be set to a file:// URI, allowing filesystem paths to be resolved and read without restriction.

Affected Package

Affecting crawl4ai package, versions
<0.8.0

Also affects

---

How to Fix

Upgrade
crawl4ai
to
0.8.0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more