PT-2026-31594 · Marimo · Marimo

Published

2026-04-08

·

Updated

2026-04-14

·

CVE-2026-39987

CVSS v4.0

9.3

Critical

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions Marimo versions prior to 0.23.0
Description Marimo, a reactive Python notebook, contains a pre-authentication remote code execution (RCE) vulnerability in the '/terminal/ws' WebSocket endpoint. This endpoint lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints that correctly implement authentication checks, the '/terminal/ws' endpoint bypasses these checks, accepting connections without verification. The vulnerability was exploited within 10 hours of public disclosure, with attackers gaining shell access and attempting to extract sensitive data. The vulnerability is fixed in version 0.23.0.
Recommendations Update to version 0.23.0 or later.

Fix

RCE

Missing Authentication

Weakness Enumeration

Related Identifiers

CVE-2026-39987
GHSA-2679-6MX9-H9XC

Affected Products

Marimo