{"id":45336,"date":"2026-04-12T22:30:12","date_gmt":"2026-04-12T14:30:12","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/12\/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation\/"},"modified":"2026-04-12T22:30:12","modified_gmt":"2026-04-12T14:30:12","slug":"critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/12\/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation\/","title":{"rendered":"Critical Marimo pre-auth RCE flaw now under active exploitation"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/10\/Marimo.jpg\" width=\"1600\" alt=\"Critical Marimo pre-auth RCE flaw now under active exploitation\"><\/p>\n<p>Hackers started exploiting a critical vulnerability in the Marimo open-source reactive Python notebook platform just 10 hours after its public disclosure.<\/p>\n<p>The flaw allows remote code execution without authentication in Marimo versions 0.20.4 and earlier. It tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-39987\" rel=\"nofollow noopener\">CVE-2026-39987<\/a> and GitHub assessed it with a critical score of 9.3 out of 10.<\/p>\n<p>According to researchers at cloud-security company Sysdig, attackers created an exploit from the information in the <a href=\"https:\/\/github.com\/marimo-team\/marimo\/security\/advisories\/GHSA-2679-6mx9-h9xc\" rel=\"nofollow noopener\">developer&#8217;s advisory<\/a> and immediately started using it in attacks that exfiltrated sensitive information.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Critical Marimo pre-auth RCE flaw now under active exploitation\"><\/a> <\/div>\n<p>Marimo is an <a href=\"https:\/\/github.com\/marimo-team\/marimo\" rel=\"nofollow noopener\">open-source<\/a> Python notebook environment, typically used by data scientists, ML\/AI practitioners, researchers, and developers building data apps or dashboards. It is a fairly popular project, with 20,000 GitHub stars and 1,000 forks.<\/p>\n<p>CVE-2026-39987 is caused by the WebSocket endpoint &lsquo;\/terminal\/ws&rsquo; exposing an interactive terminal without proper authentication checks, allowing connections from any unauthenticated client.<\/p>\n<p>This gives direct access to a full interactive shell, running with the same privileges as the Marimo process.<\/p>\n<p>Marimo disclosed the flaw on April 8 and yesterday released <a href=\"https:\/\/github.com\/marimo-team\/marimo\/releases\/tag\/0.23.0\" rel=\"nofollow noopener\">version 0.23.0<\/a> to address it. The developers noted that the flaw affects users who deployed Marimo as an editable notebook, and those who expose Marimo to a shared network using &#8211;host 0.0.0.0&nbsp;while in edit mode.<\/p>\n<h3>Exploitation in the wild<\/h3>\n<p>Within the first 12 hours after the vulnerability details were disclosed, 125 IP addresses began reconnaissance activity, according to Sysdig.<\/p>\n<p>Less than 10 hours after the disclosure, the researchers observed the first exploitation attempt in a credential theft operation.<\/p>\n<p>The attacker first validated the vulnerability by connecting to the \/terminal\/ws endpoint and executing a short scripted sequence to confirm remote command execution, disconnecting within seconds.<\/p>\n<p>Shortly after, they reconnected and began manual reconnaissance, issuing basic commands such as pwd, whoami, and ls to understand the environment, followed by directory navigation attempts and checks for SSH-related locations.<\/p>\n<p>Next, the attacker focused on credential harvesting, immediately targeting the .env file and extracting environment variables, including cloud credentials and application secrets. They then attempted to read additional files in the working directory and continued probing for SSH keys.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"154\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/cred-theft.jpg\" width=\"788\" alt=\"Critical Marimo pre-auth RCE flaw now under active exploitation\"><figcaption><strong>Stealing credentials<\/strong><br \/><em>Source: Sysdig<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The entire credential access phase was completed in less than three minutes, notes a <a href=\"https:\/\/www.sysdig.com\/blog\/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours\" rel=\"nofollow noopener\">Sysdig report<\/a> this week.<\/p>\n<p>Roughly an hour later, the attacker returned for a second exploitation session using the same exploit sequence.<\/p>\n<p>The researchers say that behind the attack appears to be a &ldquo;methodical operator&rdquo; with a hands-on approach, rather than automated scripts, focusing on high-value objectives such as stealing .env credentials and SSH keys.<\/p>\n<p>The attackers did not attempt to install persistence, deploy cryptominers, or backdoors, suggesting a quick, stealthy operation.<\/p>\n<p>Marimo users are recommended to upgrade to version 0.23.0 immediately, monitor WebSocket connections to &lsquo;\/terminal\/ws,&rsquo; restrict external access via a firewall, and rotate all exposed secrets.<\/p>\n<p>If upgrading is not possible, an effective mitigation is to block or disable access to the &lsquo;\/terminal\/ws&rsquo; endpoint entirely.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Critical Marimo pre-auth RCE flaw now under active exploitation\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks\/\">Max severity Flowise RCE vulnerability now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks\/\">Critical Fortinet Forticlient EMS flaw now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows\/\">CISA: New Langflow flaw actively exploited to hijack AI workflows<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks\/\">CISA: BeyondTrust RCE flaw now exploited in ransomware attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks\/\">One threat actor responsible for 83% of recent Ivanti RCE attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers started exploiting a critical vulnerability in  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45336","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45336"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45336\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}