Cyber Posture

CVE-2025-27785

High

Published: 19 March 2025

Published
19 March 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0067 71.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-27785 is an arbitrary file read vulnerability affecting Applio, an open-source voice conversion tool, in versions 3.2.8-bugfix and prior. The flaw resides in the `export_index` function within the `train.py` module, enabling attackers to read arbitrary files on the Applio server. It is classified under CWE-22 (Path Traversal) and CWE-200 (Exposure of Sensitive Information), with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact from network access without authentication.

Any unauthenticated attacker with network access to an affected Applio instance can exploit this vulnerability by manipulating inputs to the `export_index` function, resulting in the disclosure of sensitive files on the server. Exploitation can be chained with blind server-side request forgery (SSRF) to access files on internal network servers reachable by the Applio instance, potentially exposing configuration data, credentials, or other restricted resources.

The GitHub Security Lab advisory (GHSL-2024-341 and GHSL-2024-353) details the vulnerability with references to specific lines in `train.py` (L273 and L816). As of the CVE publication on 2025-03-19, no patches or mitigations are available for Applio. Security practitioners should isolate Applio instances from untrusted networks, monitor for anomalous file access attempts, and consider custom input validation until upstream fixes are released.

Details

CWE(s)
CWE-22CWE-200

Affected Products

applio
applio
≤ 3.2.8-bugfix

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The CVE describes an unauthenticated arbitrary file read (path traversal) in a publicly accessible web application, directly enabling T1190 (exploitation of public-facing apps) and T1005 (collection of data from local system files including sensitive configs/credentials).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References