This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **CVE-2026-39987: Critical Access Control Failure** * **Essence:** The `marimo` interactive Python notebook has a gaping hole in its security. * **Flaw:** The terminal WebSocket endpoint (`/terminal/ws`) lacks autβ¦
π **Public Exploitation: YES** * **PoC Available:** Yes. * **Source:** ProjectDiscovery Nuclei Templates. * **Status:** Automated scanning tools can detect and exploit this easily. π§ͺ
Q7How to self-check? (Features/Scanning)
π **Self-Check Steps** * **Check Version:** Is your `marimo` version < 0.23.0? * **Scan:** Use Nuclei with the CVE-2026-39987 template. * **Verify:** Try connecting to `/terminal/ws` without auth tokens.β¦
β **Official Fix: YES** * **Patch Status:** Fixed in version **0.23.0** and above. * **Commit:** See commit `c24d4806398f30be6b12acd6c60d1d7c68cfd12a`. * **Advisory:** GHSA-2679-6mx9-h9xc confirms the fix. π οΈ
Q9What if no patch? (Workaround)
π§ **Mitigation (If No Patch)** * **Network Isolation:** Block external access to the WebSocket port. * **Reverse Proxy:** Enforce authentication at the Nginx/HAProxy level before reaching `/terminal/ws`. * **Disabβ¦