Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Critical Marimo pre-auth RCE flaw now under active exploitation
    Cybersecurity

    Critical Marimo pre-auth RCE flaw now under active exploitation

    adminBy adminApril 12, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Marimo
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Marimo

    Hackers started exploiting a critical vulnerability in the Marimo open-source reactive Python notebook platform just 10 hours after its public disclosure.

    The flaw allows remote code execution without authentication in Marimo versions 0.20.4 and earlier. It tracked as CVE-2026-39987 and GitHub assessed it with a critical score of 9.3 out of 10.

    According to researchers at cloud-security company Sysdig, attackers created an exploit from the information in the developer’s advisory and immediately started using it in attacks that exfiltrated sensitive information.

    Wiz

    Marimo is an open-source Python notebook environment, typically used by data scientists, ML/AI practitioners, researchers, and developers building data apps or dashboards. It is a fairly popular project, with 20,000 GitHub stars and 1,000 forks.

    CVE-2026-39987 is caused by the WebSocket endpoint ‘/terminal/ws’ exposing an interactive terminal without proper authentication checks, allowing connections from any unauthenticated client.

    This gives direct access to a full interactive shell, running with the same privileges as the Marimo process.

    Marimo disclosed the flaw on April 8 and yesterday released version 0.23.0 to address it. The developers noted that the flaw affects users who deployed Marimo as an editable notebook, and those who expose Marimo to a shared network using –host 0.0.0.0 while in edit mode.

    Exploitation in the wild

    Within the first 12 hours after the vulnerability details were disclosed, 125 IP addresses began reconnaissance activity, according to Sysdig.

    Less than 10 hours after the disclosure, the researchers observed the first exploitation attempt in a credential theft operation.

    The attacker first validated the vulnerability by connecting to the /terminal/ws endpoint and executing a short scripted sequence to confirm remote command execution, disconnecting within seconds.

    Shortly after, they reconnected and began manual reconnaissance, issuing basic commands such as pwd, whoami, and ls to understand the environment, followed by directory navigation attempts and checks for SSH-related locations.

    Next, the attacker focused on credential harvesting, immediately targeting the .env file and extracting environment variables, including cloud credentials and application secrets. They then attempted to read additional files in the working directory and continued probing for SSH keys.

    Stealing credentials
    Stealing credentials
    Source: Sysdig

    The entire credential access phase was completed in less than three minutes, notes a Sysdig report this week.

    Roughly an hour later, the attacker returned for a second exploitation session using the same exploit sequence.

    The researchers say that behind the attack appears to be a “methodical operator” with a hands-on approach, rather than automated scripts, focusing on high-value objectives such as stealing .env credentials and SSH keys.

    The attackers did not attempt to install persistence, deploy cryptominers, or backdoors, suggesting a quick, stealthy operation.

    Marimo users are recommended to upgrade to version 0.23.0 immediately, monitor WebSocket connections to ‘/terminal/ws,’ restrict external access via a firewall, and rotate all exposed secrets.

    If upgrading is not possible, an effective mitigation is to block or disable access to the ‘/terminal/ws’ endpoint entirely.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

    Active Critical exploitation Flaw Marimo preauth RCE
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article5 ways this Google Maps AI feature helps avoid tourist traps
    Next Article Android 16 finally brought Desktop Mode to Pixel, but I’m still sticking with DeX
    admin
    • Website

    Related Posts

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Medium-severity flaw in Microsoft SharePoint exploited

    April 16, 2026

    Critical Nginx UI auth bypass flaw now actively exploited in the wild

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    YouTube Premium is now 50% off for certain Google One subscribers

    April 16, 2026

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Google adds campaign-level filtering to bulk ad review appeals

    April 16, 2026

    MKBHD pulls back the curtain on LG’s cancelled rollable

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,337)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (820)
    • Tech Tools & Mobile / Apps (1,600)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    YouTube Premium is now 50% off for certain Google One subscribers

    April 16, 2026

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Google adds campaign-level filtering to bulk ad review appeals

    April 16, 2026
    Most Popular
    • YouTube Premium is now 50% off for certain Google One subscribers
    • Windows is getting stronger RDP file protections to fight phishing attacks
    • Google adds campaign-level filtering to bulk ad review appeals
    • MKBHD pulls back the curtain on LG’s cancelled rollable
    • Medium-severity flaw in Microsoft SharePoint exploited
    • Google’s New Gemini App for Mac Comes With Two Key Benefits (and One Drawback)
    • OpenAI pulls out of a second Stargate data center deal
    • Critical Nginx UI auth bypass flaw now actively exploited in the wild
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.