Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in train.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserialization to achieve remote code execution. As of time of publication, no known patches are available.
History

Thu, 20 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Mar 2025 20:45:00 +0000

Type Values Removed Values Added
Description Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in train.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserialization to achieve remote code execution. As of time of publication, no known patches are available.
Title Applio allows arbitrary file write in train.py
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-03-19T20:41:41.214Z

Updated: 2025-03-20T19:14:06.314Z

Reserved: 2025-03-06T18:06:54.461Z

Link: CVE-2025-27783

cve-icon Vulnrichment

Updated: 2025-03-20T19:14:02.687Z

cve-icon NVD

Status : Received

Published: 2025-03-19T21:15:40.397

Modified: 2025-03-19T21:15:40.397

Link: CVE-2025-27783

cve-icon Redhat

No data.