Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Marimo Flaw Exploited Within Hours of Disclosure

Critical Marimo Flaw Exploited Within Hours of Disclosure

Posted on April 13, 2026 By CWS

A significant security weakness was identified in Marimo, a popular open-source reactive Python notebook platform. Within a mere 10 hours of this vulnerability being revealed, cybercriminals leveraged it to extract sensitive cloud credentials, underscoring the rapid response capabilities of today’s threat actors.

Details of the Vulnerability

The vulnerability, officially recorded as CVE-2026-39987, boasts a Critical CVSS v4.0 score of 9.3. This pre-authentication Remote Code Execution (RCE) flaw impacts the /terminal/ws WebSocket endpoint of Marimo. Unlike other endpoints that ensure security through validate_auth(), this specific path fails to implement necessary authentication checks.

This oversight allows unauthorized individuals to establish a WebSocket connection, granting them a fully interactive pseudo-terminal (PTY) shell. With the shell operating under Marimo’s privileges, attackers can execute arbitrary commands without needing intricate payloads.

Rapid Exploitation by Attackers

Despite the absence of a public proof-of-concept (PoC) at the time of the incident, attackers quickly devised a working exploit using the technical details from the advisory. They initiated the attack just 9 hours and 41 minutes post-advisory release, successfully exfiltrating critical AWS access keys and application secrets within minutes.

This case highlights the vigilance of threat actors who monitor advisories to exploit niche software vulnerabilities, such as those found in Marimo, which has garnered around 20,000 stars on GitHub. Versions up to 0.20.4 are susceptible to this flaw.

Recommended Security Measures

Security teams are advised to immediately upgrade Marimo installations to the patched version 0.23.0 or later. Where immediate patching is not feasible, it is crucial to restrict external network access to the /terminal/ws endpoint. Additionally, auditing environment variables and .env files on previously exposed Marimo instances is recommended.

Organizations should rotate all potentially compromised AWS credentials, API keys, database passwords, and SSH keys. Implementing an authentication layer or reverse proxy before exposing notebook platforms to the internet can add an extra layer of security.

Sysdig Threat Research Team identified the IP 49.207.56[.]74 as the source of the WebSocket terminal exploitation. For ongoing cybersecurity updates, follow us on Google News, LinkedIn, and X. Reach out to feature your cybersecurity stories.

Cyber Security News Tags:cloud security, credential theft, CVE-2026-39987, Cybersecurity, Marimo, Python notebook, RCE vulnerability, security advisory, Threat Actors, WebSocket

Post navigation

Previous Post: Phishing Attacks Exploit GitHub and Jira Notifications
Next Post: JanelaRAT Malware Hits Latin American Banks Hard

Related Posts

Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network Cyber Security News
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News
Critical Flaw in Cisco IMC Software Exposes Systems Critical Flaw in Cisco IMC Software Exposes Systems Cyber Security News
New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials Cyber Security News
Remote File Upload Vulnerability in Cisco Meeting Management Remote File Upload Vulnerability in Cisco Meeting Management Cyber Security News
3 Key Benefits For SOCs And MSSPs  3 Key Benefits For SOCs And MSSPs  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • JanaWare Ransomware Hits Turkey via Customized Adwind
  • Major Firms Release New ICS Security Advisories
  • Dragon Boss Solutions Attack Exposes 25,000+ Endpoints
  • OpenAI Unveils GPT-5.4-Cyber for Enhanced Cybersecurity
  • OpenAI Introduces GPT-5.4-Cyber with Advanced Security Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • JanaWare Ransomware Hits Turkey via Customized Adwind
  • Major Firms Release New ICS Security Advisories
  • Dragon Boss Solutions Attack Exposes 25,000+ Endpoints
  • OpenAI Unveils GPT-5.4-Cyber for Enhanced Cybersecurity
  • OpenAI Introduces GPT-5.4-Cyber with Advanced Security Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark