Unrated severityNVD Advisory· Published Mar 19, 2025· Updated Mar 19, 2025
Applio allows arbitrary file read in train.py export_index function
CVE-2025-27785
Description
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's export_index function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files from servers on the internal network that the Applio server has access to. As of time of publication, no known patches are available.
Affected products
2- IAHispano/Appliov5Range: <= 3.2.8-bugfix
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.pymitrex_refsource_MISC
- github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.pymitrex_refsource_MISC
- securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.