CVE detail
CVE-2026-39987: Marimo Remote Code Execution Vulnerability
Source: CISA Known Exploited Vulnerabilities catalog · back to feed
Vendor / product
Marimo · Marimo
- Date added (KEV)
- Apr 23, 2026
- CISA due date
- May 07, 2026
- Ransomware campaign use
- Unknown
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vendor fix: Vendor mitigation
Scorifya interpretation
AI-generatedA short, structured read of the record above — generated when this page first loads, then cached for a week.
Plain English
Technical detail
From CISA
Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.
https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc ; https://nvd.nist.gov/vuln/detail/CVE-2026-39987
References
- https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xcExploitMitigationVendor Advisory
- https://github.com/marimo-team/marimo/commit/c24d4806398f30be6b12acd6c60d1d7c68cfd12aPatch
- https://github.com/marimo-team/marimo/pull/9098Issue TrackingPatch
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-39987US Government Resource
- https://www.sysdig.com/blog/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours
Check your domain's public posture
Scorifya doesn't test for specific CVEs, but if patching Marimo changed your headers or TLS, a fresh hardening scan helps confirm nothing regressed externally.