GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

Published: (January 16, 2026 at 08:23 PM EST)
1 min read
Source: Dev.to

Source: Dev.to

Overview

Vulnerability ID: GHSA-5882-5RX9-XGXP
CVSS Score: 10.0 (Critical)
Published: 2026-01-16

A critical Remote Code Execution (RCE) vulnerability affects Crawl4AI’s Docker deployment. Unauthenticated attackers can execute arbitrary Python code via the hooks parameter, bypassing the intended sandbox.

Vulnerability Details

  • Type: Remote Code Execution (RCE)
  • CWE: CWE‑95 (Improper Neutralization of Directives in Dynamically Evaluated Code)
  • Attack Vector: Network (API)
  • Authentication Required: None

Crawl4AI, a web scraper for LLMs, exposed an unauthenticated /crawl API endpoint that accepted custom Python code for hooks. The sandbox attempted to restrict execution using exec(), but the __import__ function remained accessible. An attacker can send a crafted JSON payload to /crawl to run system commands as root inside the Docker container, potentially stealing API keys or pivoting within the network.

Affected Versions

  • Crawl4AI Docker deployments
  • ProjectDiscovery Nuclei Template

Read the full report for GHSA-5882-5RX9-XGXP on our website for more details, including interactive diagrams and full exploit analysis.

Back to Blog

Related posts

Read more »

𝗗𝗲𝘀𝗶𝗴𝗻𝗲𝗱 𝗮 𝗣𝗿𝗼𝗱𝘂𝗰𝘁𝗶𝗼𝗻‑𝗥𝗲𝗮𝗱𝘆 𝗠𝘂𝗹𝘁𝗶‑𝗥𝗲𝗴𝗶𝗼𝗻 𝗔𝗪𝗦 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 𝗘𝗞𝗦 | 𝗖𝗜/𝗖𝗗 | 𝗖𝗮𝗻𝗮𝗿𝘆 𝗗𝗲𝗽𝗹𝗼𝘆𝗺𝗲𝗻𝘁𝘀 | 𝗗𝗥 𝗙𝗮𝗶𝗹𝗼𝘃𝗲𝗿

!Architecture Diagramhttps://dev-to-uploads.s3.amazonaws.com/uploads/articles/p20jqk5gukphtqbsnftb.gif I designed a production‑grade multi‑region AWS architectu...