By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
Computing

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

News Room
Last updated: 2026/04/10 at 8:02 AM
News Room Published 10 April 2026
Share
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
SHARE

Ravie LakshmananApr 10, 2026Vulnerability / Threat Intelligence

A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig.

The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including 0.20.4. The issue has been addressed in version 0.23.0.

“The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands,” Marimo maintainers said in an advisory earlier this week.

“Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification.”

In other words, attackers can obtain a full interactive shell on any exposed Marimo instance through a single WebSocket connection without requiring any credentials.

Sysdig said it observed the first exploitation attempt targeting the vulnerability within 9 hours and 41 minutes of it being publicly disclosed, with a credential theft operation executed in minutes, despite there being no proof-of-concept (PoC) code available at the time.

The unknown threat actor behind the activity is said to have connected to the /terminal/ws WebSocket endpoint on a honeypot system and initiated manual reconnaissance to explore the file system and, minutes later, systematically attempted to harvest data from the .env file, as well as search for SSH keys and read various files.

The attacker returned to the honeypot an hour later to access the contents of the .env file and check if other threat actors were active during the time window. No other payloads, like cryptocurrency miners or backdoors, were installed.

“The attacker built a working exploit directly from the advisory description, connected to the unauthenticated terminal endpoint, and began manually exploring the compromised environment,” the cloud security company said. “The attacker connected four times over 90 minutes, with pauses between sessions. This is consistent with a human operator working through a list of targets, returning to confirm findings.”

The speed at which newly disclosed flaws are being weaponized indicates that threat actors are closely keeping an eye on vulnerability disclosures and quickly exploiting them during the time between disclosure and patch adoption.This, in turn, has shrunk the time defenders must respond once a vulnerability is publicly announced.

“The assumption that attackers only target widely deployed platforms is wrong. Any internet-facing application with a critical advisory is a target, regardless of its popularity.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Can Motorola capture some mid-range magic with the Edge 70 Pro? Can Motorola capture some mid-range magic with the Edge 70 Pro?
Next Article Snap is sticking with Qualcomm for its next AR glasses Snap is sticking with Qualcomm for its next AR glasses
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

This Coffee Writer Brewed 20 Bags of Grocery Store Beans. Here Are the 5 Best to Buy
This Coffee Writer Brewed 20 Bags of Grocery Store Beans. Here Are the 5 Best to Buy
News
The 256GB Google Pixel 10a has already dropped to £399
The 256GB Google Pixel 10a has already dropped to £399
Gadget
Evidence of Traction: The Criterion That Proves Everything | HackerNoon
Evidence of Traction: The Criterion That Proves Everything | HackerNoon
Computing
Tech executives to be criminally liable for non-compliance with Ofcom – UKTN
Tech executives to be criminally liable for non-compliance with Ofcom – UKTN
News

You Might also Like

Evidence of Traction: The Criterion That Proves Everything | HackerNoon
Computing

Evidence of Traction: The Criterion That Proves Everything | HackerNoon

1 Min Read
Firefox 149 vs. Chrome 147 Web Browser Performance On Linux
Computing

Firefox 149 vs. Chrome 147 Web Browser Performance On Linux

2 Min Read
CES 2026: first phone-free AI glasses with eSIM and 4G connectivity unveiled · TechNode
Computing

CES 2026: first phone-free AI glasses with eSIM and 4G connectivity unveiled · TechNode

1 Min Read
The AI Illusion (Part 2): The AI Detection Mirage | HackerNoon
Computing

The AI Illusion (Part 2): The AI Detection Mirage | HackerNoon

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?