[CIVN-2026-0246] Remote code execution vulnerability in Marimo

By Published On: May 19, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Remote code execution vulnerability in Marimo


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


marimo (pip) versions prior to 0.23.0

Overview


A vulnerability has been reported in Marimo, which could allow an unauthenticated attacker to execute arbitrary commands on the targeted system.


Target Audience:

All end-user organizations and individuals using affected marimo package.


Risk Assessment:

High risk of remote code execution, unauthorized access, and full system compromise


Impact Assessment:

Potential for complete system takeover, execution of arbitrary commands, sensitive information disclosure, and service disruption.


Description


Marimo is a reactive Python notebook environment that automatically updates dependent cells when code or inputs change, ensuring consistent and reproducible execution. It stores notebooks as pure Python files, supports interactive data workflows, and can be run as scripts or deployed as web apps.


This vulnerability exists in Marimo due to improper authentication handling in the terminal WebSocket endpoint (/terminal/ws). A remote attacker could exploit this by connecting to the vulnerable endpoint and gaining access to a full pseudo-terminal (PTY) shell.


Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary commands on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc



Vendor Information


Marimo

https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc


References


Marimo

https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc


CVE Name

CVE-2026-39987




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoMfGUACgkQ3jCgcSdc

ys9UXQ//c7tFZN051bmxbFh7tl7hQqUbYkEoUA5+ezDFw7wDggUlfNiSpVUYs4Ai

7/V8ndzBfQcW/7zXdL6TVUoiburX/bpgu3QF5kxEsvZStqMB1Qh6KM7sXDdI//Y4

CV5wKe6dxKOp3mB2ud0LPqs2kvOccCxLGkw5YETk2hd6QQICGxgXQFGWhWlGQLWP

CRWXIjGj+zBt8qHPYJGrmW+m5DJCop7lHPRjxFEUpTZPPceubpKIIGWnjlMWmS38

VITFNBl+QL26uQcmQSI0cN133xOYJF9ufzOMtn2yogpcR8wyRNKy5tJ9B5blTnx5

sFZSwU+8kAeeXQIxtbqgEvX2MPbCq6/LooZvrebIiQv/rf/HjN/L6qYwdmo0uOX/

oaW/MKJsikFTvYIjnrZfo89T7ZRuEknSxKcKAkSp3lCRiAV1e+t68cWlebn+O/ff

7FZSYenYo9wzsOVsqB2KiduzGZMG42RnezZZpMT7Wj07TykomhJze1HbRF5YrRZh

0iwUH1fAQ19OaqOx6lu3OO0RpsQip+USydPufC9kXlGHZyQs0mssjNh3sD/i+dH2

/wyEf1K1Sjg30qbOY8tLYahhclMAPu5TLwGZUx3OtnH5KSNW+V88qPowucH5Nd0k

OdYV9PtFYDkWEvgkygIGz9ptt3S6yHU4nLlUo6K2zVHpy3AHaVI=

=fHJ9

—–END PGP SIGNATURE—–

Share this article