


Perceptive Security
SOC/SIEM Consultancy

Mobile Next is an MCP server for mobile development and automation. Prior to version 0.0.49, the `@mobilenext/mobile-mcp` server contains a Path Traversal vulneā¦
Published:
26 maart 2026 om 23:00:00
Alert date:
27 maart 2026 om 23:03:46
Source:
nvd.nist.gov
Mobile & IoT, Supply Chain & Dependencies
Mobile Next MCP server version prior to 0.0.49 contains a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools. The saveTo and output parameters were passed directly to filesystem operations without proper validation, allowing attackers to write files outside the intended workspace directory. This vulnerability could enable unauthorized file system access and potential data compromise. The issue has been patched in version 0.0.49 with proper input validation implemented.
Technical details
Mitigation steps:
Affected products:
Mobile Next MCP
@mobilenext/mobile-mcp
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33989
https://github.com/mobile-next/mobile-mcp/commit/f5e32295903128c1e71cf915ae6c0b76c7b0153b
https://github.com/mobile-next/mobile-mcp/releases/tag/0.0.49
https://github.com/mobile-next/mobile-mcp/security/advisories/GHSA-3p2m-h2v6-g9mx
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
