CVE-2025-27775

Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) and file write in `model_download.py` (line 143 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can be leveraged to probe for other vulnerabilities on the server itself or on other back-end systems on the internal network, that the Applio server can reach. The file write allows for writing files on the server, which can be coupled with other vulnerabilities, for example an unsafe deserialization, to achieve remote code execution on the Applio server. As of time of publication, no known patches are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:applio:applio:*:*:*:*:*:*:*:*

History

01 Aug 2025, 00:50

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/ - () https://securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/ - Third Party Advisory
References () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/download/download.py#L192-L196 - () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/download/download.py#L192-L196 - Product
References () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/rvc/lib/tools/model_download.py#L156 - () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/rvc/lib/tools/model_download.py#L156 - Product
References () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/assets/flask/routes.py#L14 - () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/assets/flask/routes.py#L14 - Product
References () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/rvc/lib/tools/model_download.py#L169-L171 - () https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/rvc/lib/tools/model_download.py#L169-L171 - Product
First Time Applio
Applio applio
CPE cpe:2.3:a:applio:applio:*:*:*:*:*:*:*:*

19 Mar 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-19 21:15

Updated : 2025-08-01 00:50


NVD link : CVE-2025-27775

Mitre link : CVE-2025-27775


JSON object : View

Products Affected

applio

  • applio
CWE
CWE-918

Server-Side Request Forgery (SSRF)