Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
History

Thu, 09 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Mobilenexthq
Mobilenexthq mobile Mcp
CPEs cpe:2.3:a:mobilenexthq:mobile_mcp:*:*:*:*:*:node.js:*:*
Vendors & Products Mobilenexthq
Mobilenexthq mobile Mcp

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Mobile-next
Mobile-next mobile-mcp
Vendors & Products Mobile-next
Mobile-next mobile-mcp

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
Title Mobile Next has Arbitrary Android Intent Execution via mobile_open_url
Weaknesses CWE-939
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-04-06T20:52:25.170Z

Updated: 2026-04-07T15:09:43.022Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35394

cve-icon Vulnrichment

Updated: 2026-04-07T14:52:22.650Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T21:16:21.300

Modified: 2026-04-09T17:49:05.567

Link: CVE-2026-35394

cve-icon Redhat

No data.