Description
Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
Published: 2026-04-06
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows callers of the mobile_open_url tool to supply arbitrary URLs that are forwarded directly to Android’s intent system without any validation of the URI scheme. As a result, an attacker can trigger a wide range of Android intents, including USSD codes, phone calls, SMS messages, and direct access to content providers. Because the intent is executed without checks, the attacker can potentially exfiltrate data, place calls, send messages, or manipulate other apps on the device. The weakness is identified as CWE‑939, which describes Remote Command Injection via unintended command execution.

Affected Systems

The flaw resides in the Mobile Next MCP server, specifically the mobile-mcp component of the Mobile Next platform. Devices running any version prior to 0.0.50 are susceptible. The remediation path—patching or upgrading to version 0.0.50 or later—removes the unchecked URL forwarding behavior.

Risk and Exploitability

With a CVSS score of 8.3, the vulnerability is considered high severity. The EPSS score is not available, and the issue is not currently listed in the CISA KEV catalog, suggesting that publicly known exploitation might be limited at present. However, the attack vector is inferred to be local or remote depending on whether the mobile_open_url tool is exposed over a network; an attacker who can supply a malicious URL to the tool can trigger the vulnerability. Without additional validation, the risk remains significant because invoking Android intents can produce a wide range of harmful outcomes.

Generated by OpenCVE AI on April 7, 2026 at 02:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Mobile Next MCP server to version 0.0.50 or later.
  • If immediate upgrade is not possible, restrict or disable the mobile_open_url functionality for untrusted input sources, ensuring that only trusted users can invoke the tool.
  • Consider isolating the MCP server from untrusted networks and monitor its activity for anomalous intent execution attempts.

Generated by OpenCVE AI on April 7, 2026 at 02:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5qhv-x9j4-c3vm @mobilenext/mobile-mcp: Arbitrary Android Intent Execution via mobile_open_url
History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Mobile-next
Mobile-next mobile-mcp
Vendors & Products Mobile-next
Mobile-next mobile-mcp

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
Title Mobile Next has Arbitrary Android Intent Execution via mobile_open_url
Weaknesses CWE-939
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H'}


Subscriptions

Mobile-next Mobile-mcp
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:09:43.022Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35394

cve-icon Vulnrichment

Updated: 2026-04-07T14:52:22.650Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-06T21:16:21.300

Modified: 2026-04-07T16:16:25.893

Link: CVE-2026-35394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:07Z

Weaknesses