Home » Database

AVID-2026-R1673

Description

Applio allows unsafe deserialization in model_information.py (CVE-2025-27780)

Details

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. model_name in model_information.py takes user-supplied input (e.g. a path to a model) and pass that value to the run_model_information_script and later to model_information function, which loads that model with torch.load in rvc/train/process/model_information.py (on line 16 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available in the main branch of the repository.

Reason for inclusion in AVID: CVE-2025-27780 describes unsafe deserialization in Applio’s model_information.py leading to remote code execution. This is a software vulnerability in an AI-related tool used to load and process ML models, affecting AI pipelines. It impacts components used to build/run AI systems (model loading/torch.load), thus within the AI software supply chain. Sufficient evidence provided by CVE report and references.

References

Affected or Relevant Artifacts

  • Developer: IAHispano
  • Deployer: IAHispano
  • Artifact Details:
TypeName
SystemApplio

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-502CWE-502: Deserialization of Untrusted Data

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-19
  • Version: 0.3.3
  • AVID Entry