High severity8.3NVD Advisory· Published Apr 6, 2026· Updated Apr 9, 2026
CVE-2026-35394
CVE-2026-35394
Description
Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@mobilenext/mobile-mcpnpm | < 0.0.50 | 0.0.50 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/mobile-next/mobile-mcp/security/advisories/GHSA-5qhv-x9j4-c3vmnvdExploitMitigationPatchVendor AdvisoryWEB
- github.com/advisories/GHSA-5qhv-x9j4-c3vmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35394ghsaADVISORY
- github.com/mobile-next/mobile-mcp/pull/299ghsaWEB
- github.com/mobile-next/mobile-mcp/releases/tag/0.0.50ghsaWEB
News mentions
0No linked articles in our index yet.