HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Critical Pre‑Auth RCE (CVE‑2026‑39987) in Marimo Notebook Platform Actively Exploited, Exposing Cloud Credentials

A pre‑authentication remote code execution flaw (CVE‑2026‑39987) in the open‑source Marimo Python notebook platform was weaponised within hours of disclosure. Attackers gained unauthenticated shell access, harvested environment files, and exfiltrated cloud API keys, creating immediate third‑party risk for any organization that runs or exposes Marimo notebooks.

LiveThreat™ Intelligence · 📅 April 13, 2026· 📰 bleepingcomputer.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

Critical Pre‑Auth RCE (CVE‑2026‑39987) in Marimo Notebook Platform Actively Exploited, Exposing Cloud Credentials

What Happened – Within hours of public disclosure, threat actors began exploiting a critical pre‑authentication remote code execution flaw (CVE‑2026‑39987) in the open‑source Marimo Python notebook platform. The vulnerability allows unauthenticated access to a WebSocket‑based terminal, giving attackers a full interactive shell with the same privileges as the Marimo process. Exploitation has already resulted in rapid credential harvesting, including cloud API keys and environment secrets.

Why It Matters for TPRM

  • The flaw targets a development‑tool used across many third‑party SaaS and data‑analytics pipelines, creating a supply‑chain risk.
  • Successful exploitation yields direct access to cloud credentials, enabling lateral movement into downstream services.
  • Rapid weaponisation demonstrates that zero‑day style exploits can appear in widely‑adopted open‑source components, demanding continuous monitoring.

Who Is Affected – Data‑science teams, ML/AI research groups, and any organization that deploys Marimo notebooks on‑premise or exposes them to a network (e.g., fintech, health‑tech, cloud‑native SaaS providers).

Recommended Actions

  • Immediately upgrade all Marimo deployments to version 0.23.0 or later.
  • Review network exposure; block inbound traffic to the /terminal/ws endpoint or restrict it to trusted IP ranges.
  • Rotate any cloud credentials, API keys, or SSH keys that may have been stored in environment files or .env assets.
  • Incorporate open‑source component scanning into your vendor risk program and monitor for similar pre‑auth RCE patterns.

Technical Notes – The vulnerability resides in the WebSocket endpoint /terminal/ws, which lacks authentication checks, allowing any client to spawn an interactive shell. CVE‑2026‑39987 received a CVSS 9.3 (critical). Exploitation steps observed: connection validation → simple commands (pwd, whoami) → extraction of .env files → harvesting of cloud secrets. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.