Vulnerability Description
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_pth` function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files from servers on the internal network that the Applio server has access to. As of time of publication, no known patches are available.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Applio | Applio | <= 3.2.8-bugfix |
Related Weaknesses (CWE)
References
- https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb297Product
- https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb297Product
- https://securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/ExploitVendor Advisory
FAQ
What is CVE-2025-27784?
CVE-2025-27784 is a vulnerability with a CVSS score of 7.5 (HIGH). Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_pth` function. This issue may lead to reading arbitrary files on the Appl...
How severe is CVE-2025-27784?
CVE-2025-27784 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-27784?
Check the references section above for vendor advisories and patch information. Affected products include: Applio Applio.