CVE-2025-27780

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Applio voice conversion tool servers by exploiting unsafe deserialization in the model loading process. Attackers can achieve remote code execution by providing malicious model files. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Applio
Versions: 3.2.8-bugfix and prior
Operating Systems: All platforms running Python and PyTorch
Default Config Vulnerable: ⚠️ Yes
Notes: Any configuration using the model information functionality is vulnerable. The vulnerability exists in the default code path.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the server, allowing data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to application compromise, data exfiltration, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation and minimal privileges, potentially only affecting the application service.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit with knowledge of PyTorch deserialization attacks. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Main branch after commit 11d139508d615a6db4d48b76634a443c66170dda

Vendor Advisory: https://securitylab.github.com/advisories/GHSL-2024-341_GHSL-2024-353_Applio/

Restart Required: Yes

Instructions:

1. Update to the latest main branch version. 2. Replace vulnerable model_information.py files. 3. Restart the Applio service. 4. Verify the fix by checking the updated code references.

🔧 Temporary Workarounds

Disable model information functionality

all

Temporarily disable the vulnerable model loading feature until patching is complete.

# Comment out or remove calls to model_information function
# Disable web interface endpoints that trigger model loading

Network isolation

linux

Restrict network access to Applio instances to trusted sources only.

# Firewall rule example: iptables -A INPUT -p tcp --dport [Applio-port] -s [trusted-ip] -j ACCEPT
# iptables -A INPUT -p tcp --dport [Applio-port] -j DROP

🧯 If You Can't Patch

  • Isolate Applio instances in a dedicated network segment with strict firewall rules
  • Implement application-level input validation and sanitization for model file paths

🔍 How to Verify

Check if Vulnerable:

Check if your version is 3.2.8-bugfix or earlier. Examine model_information.py for unsafe torch.load usage with user input.

Check Version:

Check Applio version in application interface or configuration files

Verify Fix Applied:

Verify that model_information.py no longer passes user-controlled input directly to torch.load. Check for input validation or safe loading mechanisms.

📡 Detection & Monitoring

Log Indicators:

  • Unusual model file loading patterns
  • Errors from torch.load with unexpected file types
  • Process execution from Applio context

Network Indicators:

  • Unexpected outbound connections from Applio server
  • Large file uploads to model endpoints

SIEM Query:

source="applio" AND (event="model_load" OR event="torch.load") AND file_path CONTAINS suspicious_pattern

🔗 References

📤 Share & Export