Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6796 | Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file removal in core.py. `output_tts_path` in tts.py takes arbitrary user input and passes it to `run_tts_script` function in core.py, which checks if the path in `output_tts_path` exists, and if yes, removes that path, which leads to arbitrary file removal. As of time of publication, no known patches are available. |
Fri, 01 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Applio
Applio applio |
|
| CPEs | cpe:2.3:a:applio:applio:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Applio
Applio applio |
|
| Metrics |
cvssV3_1
|
Thu, 20 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Mar 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file removal in core.py. `output_tts_path` in tts.py takes arbitrary user input and passes it to `run_tts_script` function in core.py, which checks if the path in `output_tts_path` exists, and if yes, removes that path, which leads to arbitrary file removal. As of time of publication, no known patches are available. | |
| Title | Applio allows arbitrary file removal in core.py | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-20T19:15:29.694Z
Reserved: 2025-03-06T18:06:54.461Z
Link: CVE-2025-27786
Updated: 2025-03-20T19:15:26.054Z
Status : Analyzed
Published: 2025-03-19T21:15:40.787
Modified: 2025-08-01T16:12:56.537
Link: CVE-2025-27786
No data.
OpenCVE Enrichment
No data.
EUVD