VulnerabilitiesHIGH

Critical Marimo Flaw Exploited Hours After Public Disclosure

Featured image for Critical Marimo Flaw Exploited Hours After Public Disclosure
#CVE-2026-39987#Marimo#remote code execution#Sysdig#WebSocket

Original Reporting

SWSecurityWeek·Ionut Arghire

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🛡️
🛡️ VULNERABILITY DETAILSCVE-2026-39987CVSS: 9.3ACTIVELY EXPLOITED
CVE IDCVE-2026-39987
CVSS Score9.3 / 10 (Critical)
Severity RatingHigh
Affected ProductMarimo < 0.20.4
VendorMarimo
Vulnerability TypeAuthentication Bypass → RCE
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedYes
Patch AvailableYes — version 0.23.0
Workaround Available
🎯

Basically, hackers found a serious flaw in Marimo and used it to break in quickly.

Quick Summary

A critical flaw in Marimo was exploited just hours after its disclosure. Attackers gained unauthorized access and stole credentials. Users must update to the latest version immediately.

What Happened

A critical vulnerability, identified as CVE-2026-39987, was disclosed in Marimo, an open-source reactive notebook for Python. This flaw, which has a CVSS score of 9.3, allows unauthenticated remote code execution (RCE). Within just nine hours of the advisory release, threat actors successfully exploited this vulnerability.

The Flaw

The vulnerability lies in the /terminal/ws WebSocket endpoint, which fails to validate authentication. Unlike other endpoints that enforce authentication checks, this endpoint skips this crucial step. As a result, attackers can gain an interactive shell and execute arbitrary commands without needing any credentials.

Who's Affected

All Marimo releases up to version 0.20.4 are vulnerable. Users are strongly advised to upgrade to version 0.23.0 or later, which includes necessary patches to fix this flaw.

Exploitation Details

According to reports from Sysdig, the first exploitation was recorded just 9 hours and 41 minutes after the vulnerability was made public. The attacker constructed a working exploit based on the advisory description, connecting to the unauthenticated terminal endpoint. This allowed them to perform reconnaissance and exfiltrate sensitive files containing credentials.

Attack Timeline

  • 9:41 after the advisory: Exploit observed in the wild.
  • 2 minutes after connection: Manual reconnaissance conducted by the attacker.
  • 6 minutes later: Attempt to exfiltrate files containing credentials.

This rapid exploitation highlights the need for immediate action following vulnerability disclosures.

What You Should Do

  • Update: If you are using Marimo, immediately update to version 0.23.0 or newer.
  • Monitor: Keep an eye on your systems for any unauthorized access attempts.
  • Educate: Ensure your team understands the importance of promptly applying security updates.

This incident serves as a stark reminder of the vulnerabilities present in widely used software and the speed at which attackers can act. By staying informed and vigilant, organizations can better protect themselves against such threats.

🔍 How to Check If You're Affected

  1. 1.Check for any unauthorized access attempts in your logs.
  2. 2.Verify that your Marimo version is updated to 0.23.0 or newer.
  3. 3.Monitor for unusual activity on the terminal WebSocket endpoint.

🏢 Impacted Sectors

Technology

Pro Insight

🔒 Pro insight: The swift exploitation of CVE-2026-39987 underscores the critical need for timely patching and vulnerability management in open-source software.

Sources

Original Report

SWSecurityWeek· Ionut Arghire
Read Original

Related Pings

CRITICALVulnerabilities

AWS Patches Critical RCE and Privilege Escalation Flaws

AWS has released critical patches for vulnerabilities in its Research and Engineering Studio. These flaws could let attackers execute commands as root. Immediate updates are essential to safeguard sensitive data.

Cyber Security News·
HIGHVulnerabilities

Qualcomm Security Advisory - April 2026 Vulnerabilities

Qualcomm has issued a security bulletin for April 2026, highlighting vulnerabilities in its products. Users are urged to apply updates to protect their devices. Failing to do so may expose systems to significant risks.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered

A critical vulnerability in RomM 4.4.0 allows attackers to take over admin accounts via XSS and CSRF. Users must update to version 4.4.1 to avoid risks. Stay safe!

Exploit-DB·
HIGHVulnerabilities

ZSH 5.9 Vulnerability - Remote Code Execution Exploit

A serious vulnerability in ZSH 5.9 allows remote code execution. This puts Linux systems at significant risk. Users are urged to update their software and monitor for suspicious activity.

Exploit-DB·
HIGHVulnerabilities

Jumbo Website Manager - Remote Code Execution Vulnerability

A serious vulnerability in Jumbo Website Manager allows remote code execution, risking user data and server security. Organizations should take immediate steps to protect their systems.

Exploit-DB·
HIGHVulnerabilities

GPL Odorizers GPL750 - Vulnerability Exposed Critical Flaw

A serious vulnerability in GPL Odorizers GPL750 could allow remote attackers to manipulate gas line odorant levels. Users are urged to update their systems immediately to mitigate risks.

CISA Advisories·