Crawl4AI, Server-Side Request Forgery (SSRF), CVE-2025-28197 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-28197 affects Crawl4AI versions <=0.4.247 due to improper input validation in /crawl4ai/async_dispatcher.py. The vulnerability allows attackers to perform SSRF attacks by manipulating HTTP requests, enabling unauthorized access to internal services or sensitive data. The flaw arises when user-supplied URLs are processed without proper sanitization, leading to arbitrary server-side requests. Attackers can exploit this to bypass firewalls, interact with internal APIs, or exfiltrate data from restricted systems.

DailyCVE Form

Platform: Crawl4AI
Version: <=0.4.247
Vulnerability: SSRF
Severity: Critical
Date: 06/23/2025

Prediction: Patch by 07/15/2025

What Undercode Say

Analytics:

curl -X POST http://target/crawl4ai/async_dispatcher.py -d '{"url":"http://internal-service"}'
import requests
requests.post("http://vulnerable-host/crawl4ai/async_dispatcher.py", json={"url":"file:///etc/passwd"})

Exploit:

  • Craft malicious HTTP request.
  • Abuse internal service access.
  • Exfiltrate sensitive data.

Protection from this CVE:

  • Update to patched version.
  • Restrict outbound requests.
  • Validate user-supplied URLs.

Impact:

  • Unauthorized data access.
  • Internal network compromise.
  • Privilege escalation.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top