Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. `model_name` in model_information.py takes user-supplied input (e.g. a path to a model) and pass that value to the `run_model_information_script` and later to `model_information` function, which loads that model with `torch.load` in rvc/train/process/model_information.py (on line 16 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available in the `main` branch of the repository.
CVE ID: CVE-2025-27780
CVSS Base Severity: HIGH
CVSS Base Score: 8.9
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
Vendor: IAHispano
Product: Applio
EPSS Score: 0.29% (probability of being exploited)
EPSS Percentile: 52.03% (scored less or equal to compared to others)
EPSS Date: 2025-04-17 (when was this score calculated)