Summarize with:

Share
CVE-2026-39987 is a sharp reminder that smaller developer and data-science platforms now sit in the same emergency lane as better-known internet-facing tools. In affected Marimo versions, the /terminal/ws endpoint could accept unauthenticated WebSocket connections and hand attackers a live shell. That turns a single vulnerability disclosure into a direct exploit path.
The urgency is not theoretical. Sysdig said it observed the first exploitation attempt less than 10 hours after the advisory went public, followed by manual reconnaissance and theft of .env contents from exposed instances. For defenders, that means exposed notebook environments should be treated as credential-rich application infrastructure, not harmless internal tooling.
GitHub’s advisory for Marimo says versions 0.20.4 and earlier are affected. The root issue is missing authentication enforcement on the terminal WebSocket endpoint. While Marimo’s other WebSocket flows validate auth, /terminal/ws skipped that check and could grant an interactive PTY shell to any remote client that could connect.
NVD describes the issue as CWE-306: Missing Authentication for Critical Function and lists the fix in Marimo 0.23.0. In practical terms, an attacker does not need to steal a session first, trick a user, or chain together multiple bugs. If the vulnerable service is reachable and running in edit mode, the attack surface is already dangerously short.
It is easy to underestimate a project like Marimo because it is not as widely deployed as some other notebook or AI workflow platforms. That is the wrong lesson.
The real story is speed. Sysdig said an operator turned the advisory into working exploitation in 9 hours and 41 minutes, then used the shell to inspect the environment, read .env, and probe for SSH material. That pattern matters because notebook platforms often sit close to cloud credentials, API keys, service secrets, and development data.
Once attackers land in that kind of environment, the first objective is rarely persistence. It is usually access to high-value secrets that enable lateral movement into cloud accounts, databases, CI systems, or internal applications.
According to Sysdig’s observations, the operator workflow was simple and disciplined:
pwd, whoami, and ls.env file for credentials and secretsThat is important because it shows how little friction the attacker faced. This was not noisy commodity malware spraying random payloads. It was hands-on-keyboard credential harvesting against exposed workloads.
For defenders, that means the immediate risk is not only remote code execution. It is also rapid credential exposure, downstream incident response work, and the possibility that one exposed notebook becomes an entry point to a broader environment.
0.0.0.0./terminal/ws..env, and file access around SSH locations.CVE-2026-39987 is another sign that advisory-to-exploitation time has collapsed for exposed application platforms. Attackers no longer need a polished public proof of concept to move fast. If the advisory names the endpoint, describes the missing check, and the target holds useful secrets, that can be enough.
For defenders, the lesson is straightforward: internet-facing notebook tooling belongs in the same patch, exposure, and secret-rotation discipline as other high-risk admin and developer services. If Marimo was reachable from untrusted networks, the question is no longer just whether you patched it. The question is whether you also verified what secrets may already have been exposed.
It is a pre-authentication remote code execution flaw in Marimo where the /terminal/ws endpoint can grant an unauthenticated interactive shell.
Public advisories say Marimo 0.20.4 and earlier are affected, and the issue is fixed in 0.23.0.
Yes. Sysdig reported exploitation activity in under 10 hours after the advisory was published, including .env theft and SSH-key hunting on exposed instances.
Because notebook platforms often contain cloud credentials, service secrets, and developer context that can support follow-on compromise after the initial shell access.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
Cloud & Application SecurityLiteLLM SQL injection flaw puts AI gateways on the front line CVE-2026-42208 matters because it turns an AI gateway into a high-value choke point for attackers....
Cloud & Application SecurityVishing and SSO abuse are accelerating rapid SaaS extortion The most dangerous part of modern SaaS intrusions is not always malware. Sometimes it is speed, trus...
Cloud & Application SecurityConsentFix v3 turns Azure OAuth phishing into a scalable token theft risk ConsentFix v3 matters because it shifts Azure account compromise away from password th...