Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2025-6794 | Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_pth` function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files from servers on the internal network that the Applio server has access to. As of time of publication, no known patches are available. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 Aug 2025 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Applio
         Applio applio  | 
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:applio:applio:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Applio
         Applio applio  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Thu, 20 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 19 Mar 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_pth` function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files from servers on the internal network that the Applio server has access to. As of time of publication, no known patches are available. | |
| Title | Applio allows arbitrary file read in train.py export_pth function | |
| Weaknesses | CWE-200 | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-20T19:14:46.029Z
Reserved: 2025-03-06T18:06:54.461Z
Link: CVE-2025-27784
Updated: 2025-03-20T19:14:41.104Z
Status : Analyzed
Published: 2025-03-19T21:15:40.523
Modified: 2025-08-01T16:24:06.653
Link: CVE-2025-27784
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD