Description
Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
Published: 2026-04-06
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Intent Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability occurs when the mobile_open_url tool in the mobile-mcp server passes user-supplied URLs directly to Android's intent system without validating the URL scheme. This flaw allows an attacker to trigger any Android intent, including actions that can place phone calls, send SMS messages, execute USSD codes, or access content providers. The weakness is categorized under CWE-939, indicating improper handling of user input in a dynamic context. Consequently an attacker could abuse this behavior to initiate privileged actions or exfiltrate data from the device, threatening confidentiality, integrity, and potentially availability if the intent triggers disruptive operations.

Affected Systems

The flaw affects the mobile-mcp component of the Mobile Next suite released by the mobile-next vendor. Any installation of mobile-mcp prior to version 0.0.50 is vulnerable. The affected environment is typically a Node.js-based server that interacts with Android devices via the mobile_open_url interface. Exact system configurations are not detailed, but all users running the vulnerable version of mobile-mcp in a mobile development or automation context are at risk.

Risk and Exploitability

The CVSS score of 8.3 indicates high severity, while the EPSS score of less than 1% suggests that exploitation is currently unlikely but the flaw remains serious. It is not listed in the CISA KEV catalog. The likely attack vector is remote, through any channel that allows an attacker to supply a crafted URL to the mobile_open_url endpoint, such as a web request or automated device command. Exploitation requires no special privileges on the server but does rely on the attacker’s ability to inject malicious input into the target’s environment.

Generated by OpenCVE AI on April 9, 2026 at 19:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an update to mobile-mcp version 0.0.50 or later
  • Verify that installed mobile-mcp version is >= 0.0.50
  • If an immediate update is not possible, block external access to the mobile_open_url interface or implement strict URL scheme validation before processing

Generated by OpenCVE AI on April 9, 2026 at 19:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5qhv-x9j4-c3vm @mobilenext/mobile-mcp: Arbitrary Android Intent Execution via mobile_open_url
History

Thu, 09 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Mobilenexthq
Mobilenexthq mobile Mcp
CPEs cpe:2.3:a:mobilenexthq:mobile_mcp:*:*:*:*:*:node.js:*:*
Vendors & Products Mobilenexthq
Mobilenexthq mobile Mcp

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Mobile-next
Mobile-next mobile-mcp
Vendors & Products Mobile-next
Mobile-next mobile-mcp

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.
Title Mobile Next has Arbitrary Android Intent Execution via mobile_open_url
Weaknesses CWE-939
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H'}


Subscriptions

Mobile-next Mobile-mcp
Mobilenexthq Mobile Mcp
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:09:43.022Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35394

cve-icon Vulnrichment

Updated: 2026-04-07T14:52:22.650Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T21:16:21.300

Modified: 2026-04-09T17:49:05.567

Link: CVE-2026-35394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:01Z

Weaknesses