VYPR
Unrated severityNVD Advisory· Published Mar 19, 2025· Updated Mar 20, 2025

Applio allows arbitrary file read in train.py export_pth function

CVE-2025-27784

Description

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's export_pth function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files from servers on the internal network that the Applio server has access to. As of time of publication, no known patches are available.

Affected products

2
  • Applio/Appliollm-fuzzy
    Range: <=3.2.8-bugfix
  • IAHispano/Appliov5
    Range: <= 3.2.8-bugfix

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.