🚨 CRITICAL ALERT: Active Zero-Day Exploits

Urgent: Attackers are actively exploiting CVE-2026-39987 (CVSS 9.8) in Marimo Python notebooks, achieving pre-auth RCE via unauthenticated WebSocket connections within hours of disclosure on April 8, 2026. Real-world attacks include credential theft, manual shell access, and malware deployment like NKAbuse botnet—patch immediately to prevent full server compromise.

Critical Vulnerabilities (CVSS >= 8.0)

  • CVE-2026-39987 (CVSS: 9.8): Marimo reactive Python notebook prior to 0.23.0 exposes /terminal/ws WebSocket without authentication, granting unauthenticated attackers full PTY shell and arbitrary command execution. Exploited in the wild within 10 hours of disclosure by methodical operators stealing credentials/SSH keys and deploying malware; affects data science/ML environments. View NVD | CISA KEV

âš¡ Immediate Actions Required

Do this NOW:

  • Upgrade Marimo to 0.23.0 or later across all instances.
  • Block external access to Marimo ports (default 2718); use firewalls/VPC rules.
  • Scan for exposed instances: Check /terminal/ws endpoint for unauthenticated access.
  • Review logs for WebSocket connections post-April 8, 2026; hunt for anomalous shells, .env/SSH key theft, or NKAbuse IOCs.
  • Monitor CISA KEV for updates—active exploitation confirmed by Sysdig and others.