Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Critical Marimo Flaw Exploited Hours After Public Disclosure
    Cybersecurity

    Critical Marimo Flaw Exploited Hours After Public Disclosure

    adminBy adminApril 11, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Vulnerability exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A threat actor built an exploit for a critical-severity vulnerability in Marimo and started using it in attacks roughly nine hours after the bug’s public disclosure, cloud security firm Sysdig reports.

    Marimo is an open source reactive notebook for Python designed to ensure that code, outputs, and program state remain consistent. It has approximately 20,000 stars on GitHub.

    On April 8, the platform’s maintainers disclosed CVE-2026-39987 (CVSS score of 9.3), an unauthenticated remote code execution (RCE) flaw rooted in the lack of authentication validation in the terminal WebSocket endpoint.

    The issue could allow attackers to obtain a full interactive shell without authentication, leading to arbitrary system command execution.

    “Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification,” Marimo’s maintainers explain.

    According to Sysdig, the first exploitation of the bug was observed 9 hours and 41 minutes after the advisory was published. Although no proof-of-concept (PoC) had been published, the attacker created a functional exploit and used it to steal credentials.

    Advertisement. Scroll to continue reading.

    “The attacker built a working exploit directly from the advisory description, connected to the unauthenticated terminal endpoint, and began manually exploring the compromised environment,” Sysdig notes.

    The cybersecurity firm says it has observed exploitation activity from a single IP address, but an additional 125 addresses were involved in reconnaissance operations, such as port scanning and HTTP probing.

    As part of the attack caught by a Sysdig honeypot, the threat actor connected to the vulnerable terminal WebSocket endpoint, performed manual reconnaissance two minutes later, and returned six minutes later to exfiltrate credential-containing files.

    Furthermore, the attacker was seen attempting to read every file in the targeted directory and searching for SSH keys. The entire operation, Sysdig says, was over within three minutes.

    All Marimo releases up to version 0.20.4 are affected by CVE-2026-39987. Users are advised to update to version 0.23.0 or newer, which contains patches for the bug.

    Related: Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover

    Related: Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

    Related: Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

    Related: RCE Bug Lurked in Apache ActiveMQ Classic for 13 Years

    Critical Disclosure Exploited Flaw hours Marimo public
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleSpray Your Shoes With Permethrin to Avoid Ticks This Summer
    Next Article I replaced my NAS with Google Drive and barely noticed
    admin
    • Website

    Related Posts

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026

    Opera’s browsers just picked up a new AI feature that’s actually useful

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,342)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (822)
    • Tech Tools & Mobile / Apps (1,605)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026
    Most Popular
    • 4 reasons I use a 19-year-old app to copy and move files in Windows
    • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    • Why Your Search Data Doesn’t Agree (And What To Do About It)
    • Opera’s browsers just picked up a new AI feature that’s actually useful
    • GitHub lays out copyright liability changes and upcoming DMCA review for developers
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    • New AgingFly malware used in attacks on Ukraine govt, hospitals
    • Capsule Security Emerges From Stealth With $7 Million in Funding
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.