crawl4ai@0.7.8 vulnerabilities

🚀🤖 Crawl4AI: Open-source LLM Friendly Web Crawler & scraper

Direct Vulnerabilities

Known vulnerabilities in the crawl4ai package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

Crawl4AI is a 🚀🤖 Crawl4AI: Open-source LLM Friendly Web Crawler & scraper

Affected versions of this package are vulnerable to Directory Traversal via the Docker API endpoints that accept file:// URLs. An attacker can access sensitive files on the server filesystem by submitting crafted requests to /execute_js, /screenshot, /pdf, or /html endpoints. This results in exposure of confidential information, including system files, environment variables, and application credentials.

How to fix Directory Traversal?

Upgrade Crawl4AI to version 0.8.0 or higher.

[,0.8.0)
  • M
Server-side Request Forgery (SSRF)

Crawl4AI is a 🚀🤖 Crawl4AI: Open-source LLM Friendly Web Crawler & scraper

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the async_dispatcher.py module. An attacker can manipulate the server into making arbitrary requests to internal or external resources by sending crafted input to the affected module.

How to fix Server-side Request Forgery (SSRF)?

There is no fixed version for Crawl4AI.

[0,)