Unrated severityNVD Advisory· Published Mar 19, 2025· Updated Mar 20, 2025
Applio allows arbitrary file write in train.py
CVE-2025-27783
Description
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in train.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserialization to achieve remote code execution. As of time of publication, no known patches are available.
Affected products
2- IAHispano/Appliov5Range: <= 3.2.8-bugfix
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.pymitrex_refsource_MISC
- github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.pymitrex_refsource_MISC
- github.com/IAHispano/Applio/blob/d7d685fefd0c58e29e1d84d668613056791544a7/tabs/inference/inference.pymitrex_refsource_MISC
- securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.