BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Marimo Critical Flaw Exploited in Under 10 Hours

Critical Marimo flaw exploited within ten hours, granting attackers full system access.

  • A critical security vulnerability (CVE-2026-39987) in the open-source Python notebook Marimo was exploited within 9 hours and 41 minutes of public disclosure.
  • The flaw allowed unauthenticated attackers to obtain a full system shell and execute arbitrary commands on any exposed instance, bypassing authentication.
  • The first observed attack involved manual reconnaissance to harvest credentials from the .env file and search for SSH keys, but no additional malware was deployed.
  • Attackers built a working exploit directly from the advisory description, demonstrating the shrinking window for defenders to apply critical patches.

In a stark demonstration of modern cyber threat velocity, a critical flaw in the Marimo data science notebook was weaponized by attackers less than 10 hours after its public disclosure on April 10, 2026, according to findings from Sysdig. The vulnerability, a pre-authenticated remote code execution bug tracked as CVE-2026-39987 with a CVSS score of 9.3, impacted all versions up to and including 0.20.4.

- Advertisement -

Maintainers stated in an advisory that the terminal WebSocket endpoint completely skipped authentication verification. Consequently, an unauthenticated attacker could connect and obtain a full interactive PTY shell to execute arbitrary system commands.

Sysdig’s honeypot recorded the first exploitation attempt just 9 hours and 41 minutes post-disclosure, even without public proof-of-concept code. The unknown threat actor manually explored the file system and systematically attempted to harvest data, notably targeting the .env file and SSH keys.

The attacker returned to the compromised system an hour later to access stolen data and check for other malicious activity. Meanwhile, no other payloads like cryptocurrency miners or backdoors were installed during these sessions.

This rapid exploitation highlights how threat actors closely monitor vulnerability disclosures. The incident proves that any internet-facing application with a critical advisory is a target, regardless of its popularity.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

CEO: Mortgage your home to buy STRC, not bitcoin

Strategy CEO Phong Le is promoting Stretch (STRC) as an income source, advising investors...

Bitcoin Firms Above Key $75,000 Investor Cost Basis Cluster

Bitcoin is trading near a critical cluster of investor cost-basis levels around $75,000, including...

Malicious Python Package Steals Credentials

Threat actors published two malicious versions of the popular Python package Lightning (2.6.2 and...

Senate Bans Members From Trading on Prediction Markets

The U.S. Senate has unanimously passed a resolution that immediately bans its members from...

North Korea Stole 76% of 2026 Crypto Hack Value

North Korean Hackers stole 76% of all cryptocurrency taken in 2026 hacks through two...

Must Read

18 Countries With No Privacy Laws According To UN (List)

Privacy laws are legal frameworks designed to protect personal data from unauthorized access, misuse, or disclosure.Lack of privacy laws can lead to misuse of...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading