Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Cline AI Agent Vulnerability Allows RCE Attacks
May 12, 2026
Malicious Chrome MV3 Extension Steals TronLink Crypto
May 12, 2026
Microsoft Warns: MistralAI PyPI Package Injects Compromised Malicious
May 12, 2026
Home/CyberSecurity News/Marimo RCE Vulnerability Exploited Just 10 Within Hours
CyberSecurity News

Marimo RCE Vulnerability Exploited Just 10 Within Hours

A critical vulnerability affecting Marimo, an open-source reactive Python notebook platform, was recently disclosed. Within just 10 hours, attackers had already weaponized this flaw, successfully...

Marcus Rodriguez
Marcus Rodriguez
April 13, 2026 2 Min Read
6 0

A critical vulnerability affecting Marimo, an open-source reactive Python notebook platform, was recently disclosed. Within just 10 hours, attackers had already weaponized this flaw, successfully stealing sensitive cloud credentials and underscoring the rapid pace of modern threat actor exploitation.

The security flaw is formally tracked as CVE-2026-39987 (formerly GHSA-2679-6mx9-h9xc) and carries a Critical CVSS v4.0 score of 9.3.

It is a pre-authentication Remote Code Execution (RCE) vulnerability that specifically affects the /terminal/ws WebSocket endpoint of the Marimo application.

Unlike other WebSocket endpoints that correctly enforce authentication by calling validate_auth(), the /terminal/ws path completely skips this validation.

Marimo RCE Vulnerability Exploited

This oversight allows any unauthenticated attacker to establish a single WebSocket connection and instantly receive a full interactive pseudo-terminal (PTY) shell.

Because the shell runs with the privileges of the Marimo process, attackers can execute arbitrary system commands and explore the underlying host without crafting complex payloads.

At the time of the attack, no public proof-of-concept (PoC) code was available. The attacker manually constructed a working exploit directly from the technical details provided in the advisory.

During the intrusion, the attacker executed a structured validation script before transitioning to manual reconnaissance.

According to the Sysdig Threat Research Team, the first exploitation attempt occurred just 9 hours and 41 minutes after the advisory was published.

Within three minutes of gaining access, the threat actor successfully located and exfiltrated the .env file containing critical AWS access keys and application secrets.

This incident shows threat actors monitor advisories to target niche software like Marimo (~20,000 GitHub stars), with versions up to and including 0.20.4 affected.

Security teams should immediately apply the following actions to secure their environments:

  • Update Marimo installations to patched version 0.23.0 or later immediately.
  • Restrict external network access to the /terminal/ws endpoint if immediate patching is impossible.
  • Audit environment variables and .env files on any previously exposed Marimo instances.
  • Rotate all potentially compromised AWS credentials, API keys, database passwords, and SSH keys.
  • Implement an authentication layer or reverse proxy before exposing notebook platforms to the internet.

Indicator of Compromise: 49.207.56[.]74 identified as the source IP exploiting a WebSocket terminal and stealing credentials.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Hackers Abuse MSBuild LOLBin for File Evade Detection

Next Post

Critical Axios Vulnerability Allows Remote Code Execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Magecart Hackers Abuse GTM for Credit Card Sk Google Manager
May 12, 2026
TeamPCP Compromises Checkmarx Jenkins Compromised Plugin
May 12, 2026
Android Zero-Click Vulnerability Enables Remote Shell Access
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us