{"uuid": "c183e675-3a0d-4e07-b1ac-6aa9be450763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27785", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8157", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27785\n\ud83d\udd25 CVSS Score: 7.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_index` function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files from servers on the internal network that the Applio server has access to. As of time of publication, no known patches are available.\n\ud83d\udccf Published: 2025-03-19T20:35:10.662Z\n\ud83d\udccf Modified: 2025-03-19T20:47:30.839Z\n\ud83d\udd17 References:\n1. https://securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/\n2. https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.py#L273\n3. https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.py#L816", "creation_timestamp": "2025-03-19T21:18:27.000000Z"}