Unrated severityNVD Advisory· Published Mar 19, 2025· Updated Mar 20, 2025
Applio allows arbitrary file removal in core.py
CVE-2025-27786
Description
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file removal in core.py. output_tts_path in tts.py takes arbitrary user input and passes it to run_tts_script function in core.py, which checks if the path in output_tts_path exists, and if yes, removes that path, which leads to arbitrary file removal. As of time of publication, no known patches are available.
Affected products
2- IAHispano/Appliov5Range: <= 3.2.8-bugfix
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/core.pymitrex_refsource_MISC
- github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/tts/tts.pymitrex_refsource_MISC
- securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.