Cyber Posture

CVE-2025-27783

Critical

Published: 19 March 2025

Published
19 March 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1536 94.7th percentile
Risk Priority 29 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Python commands and scripts for execution.

Security Summary

CVE-2025-27783 is an arbitrary file write vulnerability (CWE-22) in Applio, an open-source voice conversion tool. It affects versions 3.2.8-bugfix and prior, specifically within the train.py component. The flaw enables attackers to write arbitrary files on the Applio server and can be chained with an unsafe deserialization issue to achieve remote code execution. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.

Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By targeting the affected train.py code paths, they can overwrite or create files at arbitrary locations on the server, potentially leading to full system compromise when combined with deserialization flaws for remote code execution.

The GitHub Security Lab advisory (GHSL-2024-341 and GHSL-2024-353) identifies the issue in train.py lines 212-225 and 484-491, as well as inference.py line 295. As of the CVE publication on 2025-03-19, no patches are available, leaving users to mitigate by avoiding vulnerable versions or restricting network access to Applio servers.

Details

CWE(s)
CWE-22

Affected Products

applio
applio
≤ 3.2.8-bugfix

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

Remote unauthenticated arbitrary file write in public-facing Applio server (T1190) chained with unsafe deserialization for Python-based RCE (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References