A critical pre-authentication remote code execution vulnerability in Marimo, a Python notebook platform, was exploited in under 10 hours after its public disclosure. The flaw, tracked as CVE-2026-39987 with a severity score of 9.3, affects all Marimo versions prior to 0.23.0 and can be triggered by a single connection request to a specific endpoint, requiring no login or stolen credentials. This vulnerability poses a significant threat as it can be exploited without complex measures, making it an attractive target for attackers. The rapid exploitation of this flaw highlights the importance of prompt patching and mitigation. The vulnerability's public disclosure has expanded the active attack surface, making it crucial for entities to prioritize their exposure and exploitation evidence1. This incident serves as a reminder for practitioners to stay vigilant and take immediate action to protect their systems from such critical vulnerabilities.
Critical flaw in Marimo Python notebook exploited within 10 hours of disclosure
⚠️ Critical Alert
Why This Matters
CVE-2026-39987 disclosure expands the active attack surface — prioritize based on your exposure and exploitation evidence.
References
- CSO Online. (2026, April 13). Critical flaw in Marimo Python notebook exploited within 10 hours of disclosure. *CSO Online*. https://www.csoonline.com/article/4157810/critical-flaw-in-marimo-python-notebook-exploited-within-10-hours-of-disclosure.html
Original Source
CSO Online
Read original →