BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Marimo Critical Flaw Exploited in Under 10 Hours

Critical Marimo flaw exploited within ten hours, granting attackers full system access.

  • A critical security vulnerability (CVE-2026-39987) in the open-source Python notebook Marimo was exploited within 9 hours and 41 minutes of public disclosure.
  • The flaw allowed unauthenticated attackers to obtain a full system shell and execute arbitrary commands on any exposed instance, bypassing authentication.
  • The first observed attack involved manual reconnaissance to harvest credentials from the .env file and search for SSH keys, but no additional malware was deployed.
  • Attackers built a working exploit directly from the advisory description, demonstrating the shrinking window for defenders to apply critical patches.

In a stark demonstration of modern cyber threat velocity, a critical flaw in the Marimo data science notebook was weaponized by attackers less than 10 hours after its public disclosure on April 10, 2026, according to findings from Sysdig. The vulnerability, a pre-authenticated remote code execution bug tracked as CVE-2026-39987 with a CVSS score of 9.3, impacted all versions up to and including 0.20.4.

- Advertisement -

Maintainers stated in an advisory that the terminal WebSocket endpoint completely skipped authentication verification. Consequently, an unauthenticated attacker could connect and obtain a full interactive PTY shell to execute arbitrary system commands.

Sysdig’s honeypot recorded the first exploitation attempt just 9 hours and 41 minutes post-disclosure, even without public proof-of-concept code. The unknown threat actor manually explored the file system and systematically attempted to harvest data, notably targeting the .env file and SSH keys.

The attacker returned to the compromised system an hour later to access stolen data and check for other malicious activity. Meanwhile, no other payloads like cryptocurrency miners or backdoors were installed during these sessions.

This rapid exploitation highlights how threat actors closely monitor vulnerability disclosures. The incident proves that any internet-facing application with a critical advisory is a target, regardless of its popularity.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Bitcoin QuantumSafe Plan Costly, No Fork Needed

A researcher has proposed a quantum-safe Bitcoin transaction scheme that works without changing the...

TD Cowen Downgrades MSTR Target, Calls Sharplink a ‘Buy’

TD Cowen has initiated coverage of Ethereum treasury firm Sharplink with a "buy" rating,...

McLaren Racing Joins Hedera Governing Council

McLaren Racing has joined the Hedera Council, gaining a governance role and launching digital...

Comic raised $50K for Gaza via staged memecoin rug pulls.

Comedian William Banks orchestrated a fabricated prison break video that garnered over 10 million...

TON Blockchain Cuts Block Times, Boosts Speed 6-Fold

The Open Network (TON) released its Catchain 2.0 consensus upgrade on Thursday, slashing block...

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading