Home » Database

AVID-2026-R1674

Description

Applio allows unsafe deserialization in inference.py (CVE-2025-27781)

Details

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in inference.py. model_file in inference.py as well as model_file in tts.py take user-supplied input (e.g. a path to a model) and pass that value to the change_choices and later to get_speakers_id function, which loads that model with torch.load in inference.py (line 326 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available on the main branch of the repository.

Reason for inclusion in AVID: Unsafe deserialization in Applio’s inference pathway allows remote code execution by loading user-supplied model files via torch.load. This directly concerns AI inference/model-loading components and their software stack, impacting the deployment/run of AI systems. The CVE description and references provide clear vulnerability behavior and remediation signals.

References

Affected or Relevant Artifacts

  • Developer: IAHispano
  • Deployer: IAHispano
  • Artifact Details:
TypeName
SystemApplio

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-502CWE-502: Deserialization of Untrusted Data

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-19
  • Version: 0.3.3
  • AVID Entry