๐Ÿ” CVE Alert

CVE-2026-33989

HIGH 8.1

@mobilenext/mobile-mcp alllows arbitrary file write via Path Traversal in mobile screen capture tools

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
12th

Mobile Next is an MCP server for mobile development and automation. Prior to version 0.0.49, the `@mobilenext/mobile-mcp` server contains a Path Traversal vulnerability in the `mobile_save_screenshot` and `mobile_start_screen_recording` tools. The `saveTo` and `output` parameters were passed directly to filesystem operations without validation, allowing an attacker to write files outside the intended workspace. Version 0.0.49 fixes the issue.

CWE CWE-22 CWE-73
Vendor mobile-next
Product mobile-mcp
Published Mar 27, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for mobile-next mobile-mcp

Be the first to know when new high vulnerabilities affecting mobile-next mobile-mcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

mobile-next / mobile-mcp
< 0.0.49

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/mobile-next/mobile-mcp/security/advisories/GHSA-3p2m-h2v6-g9mx github.com: https://github.com/mobile-next/mobile-mcp/commit/f5e32295903128c1e71cf915ae6c0b76c7b0153b github.com: https://github.com/mobile-next/mobile-mcp/releases/tag/0.0.49