Cyber Posture

CVE-2025-27779

Critical

Published: 19 March 2025

Published
19 March 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1040 93.2th percentile
Risk Priority 26 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Python commands and scripts for execution.

Security Summary

CVE-2025-27779 is an unsafe deserialization vulnerability affecting Applio, an open-source voice conversion tool, in versions 3.2.8-bugfix and prior. The issue resides in the `model_blender.py` file at lines 20 and 21, where the `model_blender` function uses `torch.load` to load two models specified by user-supplied inputs (`model_fusion_a` and `model_fusion_b`) sourced from `voice_blender.py`. These inputs, such as paths to models, are passed through `run_model_blender_script` without proper validation, enabling deserialization of untrusted data and classified under CWE-502. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability by tricking a user into providing a malicious model path or file via the voice blender feature. Successful exploitation leads to arbitrary remote code execution on the victim's machine, with high impact on confidentiality, integrity, and availability, as the deserialization occurs without privileges or user interaction beyond supplying the input.

Mitigation is available via a patch committed to the main branch of the Applio GitHub repository (commit 11d139508d615a6db4d48b76634a443c66170dda). Security practitioners should advise users to update to the latest version from the main branch and avoid loading untrusted model files. Additional details are provided in the GitHub Security Lab advisory (GHSL-2024-341_GHSL-2024-353_Applio) and affected code references.

Details

CWE(s)
CWE-502

Affected Products

applio
applio
≤ 3.2.8-bugfix

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

Unsafe deserialization via torch.load on untrusted user input in Python app enables remote exploitation of public-facing application (T1190) leading to arbitrary code execution via Python interpreter (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References