Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Marimo Flaw Exploited Within Hours of Disclosure

Critical Marimo Flaw Exploited Within Hours of Disclosure

Posted on April 13, 2026 By CWS

A significant security weakness was identified in Marimo, a popular open-source reactive Python notebook platform. Within a mere 10 hours of this vulnerability being revealed, cybercriminals leveraged it to extract sensitive cloud credentials, underscoring the rapid response capabilities of today’s threat actors.

Details of the Vulnerability

The vulnerability, officially recorded as CVE-2026-39987, boasts a Critical CVSS v4.0 score of 9.3. This pre-authentication Remote Code Execution (RCE) flaw impacts the /terminal/ws WebSocket endpoint of Marimo. Unlike other endpoints that ensure security through validate_auth(), this specific path fails to implement necessary authentication checks.

This oversight allows unauthorized individuals to establish a WebSocket connection, granting them a fully interactive pseudo-terminal (PTY) shell. With the shell operating under Marimo’s privileges, attackers can execute arbitrary commands without needing intricate payloads.

Rapid Exploitation by Attackers

Despite the absence of a public proof-of-concept (PoC) at the time of the incident, attackers quickly devised a working exploit using the technical details from the advisory. They initiated the attack just 9 hours and 41 minutes post-advisory release, successfully exfiltrating critical AWS access keys and application secrets within minutes.

This case highlights the vigilance of threat actors who monitor advisories to exploit niche software vulnerabilities, such as those found in Marimo, which has garnered around 20,000 stars on GitHub. Versions up to 0.20.4 are susceptible to this flaw.

Recommended Security Measures

Security teams are advised to immediately upgrade Marimo installations to the patched version 0.23.0 or later. Where immediate patching is not feasible, it is crucial to restrict external network access to the /terminal/ws endpoint. Additionally, auditing environment variables and .env files on previously exposed Marimo instances is recommended.

Organizations should rotate all potentially compromised AWS credentials, API keys, database passwords, and SSH keys. Implementing an authentication layer or reverse proxy before exposing notebook platforms to the internet can add an extra layer of security.

Sysdig Threat Research Team identified the IP 49.207.56[.]74 as the source of the WebSocket terminal exploitation. For ongoing cybersecurity updates, follow us on Google News, LinkedIn, and X. Reach out to feature your cybersecurity stories.

Cyber Security News Tags:cloud security, credential theft, CVE-2026-39987, Cybersecurity, Marimo, Python notebook, RCE vulnerability, security advisory, Threat Actors, WebSocket

Post navigation

Previous Post: Phishing Attacks Exploit GitHub and Jira Notifications
Next Post: JanelaRAT Malware Hits Latin American Banks Hard

Related Posts

Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly Cyber Security News
Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware Cyber Security News
Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Cyber Security News
New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence Cyber Security News
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Axios Flaw Risks Cloud Security Breach
  • JanelaRAT Malware Hits Latin American Banks Hard
  • Critical Marimo Flaw Exploited Within Hours of Disclosure
  • Phishing Attacks Exploit GitHub and Jira Notifications
  • Nginx 1.29.8 & FreeNginx Update Bolster Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Axios Flaw Risks Cloud Security Breach
  • JanelaRAT Malware Hits Latin American Banks Hard
  • Critical Marimo Flaw Exploited Within Hours of Disclosure
  • Phishing Attacks Exploit GitHub and Jira Notifications
  • Nginx 1.29.8 & FreeNginx Update Bolster Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark