
[CIVN-2026-0246] Remote code execution vulnerability in Marimo
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote code execution vulnerability in Marimo
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
marimo (pip) versions prior to 0.23.0
Overview
A vulnerability has been reported in Marimo, which could allow an unauthenticated attacker to execute arbitrary commands on the targeted system.
Target Audience:
All end-user organizations and individuals using affected marimo package.
Risk Assessment:
High risk of remote code execution, unauthorized access, and full system compromise
Impact Assessment:
Potential for complete system takeover, execution of arbitrary commands, sensitive information disclosure, and service disruption.
Description
Marimo is a reactive Python notebook environment that automatically updates dependent cells when code or inputs change, ensuring consistent and reproducible execution. It stores notebooks as pure Python files, supports interactive data workflows, and can be run as scripts or deployed as web apps.
This vulnerability exists in Marimo due to improper authentication handling in the terminal WebSocket endpoint (/terminal/ws). A remote attacker could exploit this by connecting to the vulnerable endpoint and gaining access to a full pseudo-terminal (PTY) shell.
Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary commands on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
Vendor Information
Marimo
https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
References
Marimo
https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
CVE Name
CVE-2026-39987
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=fHJ9
—–END PGP SIGNATURE—–


