Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5qhv-x9j4-c3vm | @mobilenext/mobile-mcp: Arbitrary Android Intent Execution via mobile_open_url |
Thu, 09 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobilenexthq
Mobilenexthq mobile Mcp |
|
| CPEs | cpe:2.3:a:mobilenexthq:mobile_mcp:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Mobilenexthq
Mobilenexthq mobile Mcp |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobile-next
Mobile-next mobile-mcp |
|
| Vendors & Products |
Mobile-next
Mobile-next mobile-mcp |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50. | |
| Title | Mobile Next has Arbitrary Android Intent Execution via mobile_open_url | |
| Weaknesses | CWE-939 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T15:09:43.022Z
Reserved: 2026-04-02T17:03:42.074Z
Link: CVE-2026-35394
Updated: 2026-04-07T14:52:22.650Z
Status : Analyzed
Published: 2026-04-06T21:16:21.300
Modified: 2026-04-09T17:49:05.567
Link: CVE-2026-35394
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:01Z
Github GHSA