VYPR
Unrated severityNVD Advisory· Published Mar 19, 2025· Updated Mar 20, 2025

Applio allows unsafe deserialization in model_information.py

CVE-2025-27780

Description

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. model_name in model_information.py takes user-supplied input (e.g. a path to a model) and pass that value to the run_model_information_script and later to model_information function, which loads that model with torch.load in rvc/train/process/model_information.py (on line 16 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available in the main branch of the repository.

Affected products

2
  • Applio/Appliollm-fuzzy
    Range: <=3.2.8-bugfix
  • IAHispano/Appliov5
    Range: <= 3.2.8-bugfix

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.