Mobile Next is an MCP server for mobile development and automation. Prior to version 0.0.49, the `@mobilenext/mobile-mcp` server contains a Path Traversal vulnerability in the `mobile_save_screenshot` and `mobile_start_screen_recording` tools. The `saveTo` and `output` parameters were passed directly to filesystem operations without validation, allowing an attacker to write files outside the intended workspace. Version 0.0.49 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/mobile-next/mobile-mcp/commit/f5e32295903128c1e71cf915ae6c0b76c7b0153b | Patch |
| https://github.com/mobile-next/mobile-mcp/releases/tag/0.0.49 | Release Notes |
| https://github.com/mobile-next/mobile-mcp/security/advisories/GHSA-3p2m-h2v6-g9mx | Exploit Vendor Advisory |
Configurations
History
31 Mar 2026, 21:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/mobile-next/mobile-mcp/commit/f5e32295903128c1e71cf915ae6c0b76c7b0153b - Patch | |
| References | () https://github.com/mobile-next/mobile-mcp/releases/tag/0.0.49 - Release Notes | |
| References | () https://github.com/mobile-next/mobile-mcp/security/advisories/GHSA-3p2m-h2v6-g9mx - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:mobilenexthq:mobile_mcp:*:*:*:*:*:node.js:*:* | |
| First Time |
Mobilenexthq mobile Mcp
Mobilenexthq |
27 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 22:16
Updated : 2026-03-31 21:52
NVD link : CVE-2026-33989
Mitre link : CVE-2026-33989
CVE.ORG link : CVE-2026-33989
JSON object : View
Products Affected
mobilenexthq
- mobile_mcp
