CVE-2025-27786
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file removal in core.py. outputttspath in tts.py takes arbitrary user input and passes it to runttsscript function in core.py, which checks if the path in outputttspath exists, and if yes, removes that path, which leads to arbitrary file removal. As of time of publication, no known patches are available.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/core.py#L329, https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/tts/tts.py#L133, https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/27xxx/CVE-2025-27786.json, https://nvd.nist.gov/vuln/detail/CVE-2025-27786, https://securitylab.github.com/advisories/GHSL-2024-341GHSL-2024-353Applio/
