CVE-2025-43846

Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path1 variable takes user input (e.g. a path to a model) and passes it to the show_info function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:*

History

01 Aug 2025, 16:54

Type Values Removed Values Added
References () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer/lib/train/process_ckpt.py#L53 - () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer/lib/train/process_ckpt.py#L53 - Product
References () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1439 - () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1439 - Product
References () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1444 - () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1444 - Product
References () https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/ - () https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/ - Vendor Advisory
CPE cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:*
Summary
  • (es) Retrieval-based-Voice-Conversion-WebUI es un framework de modificación de voz basado en VITS. Las versiones 2.2.231006 y anteriores son vulnerables a la deserialización insegura. La variable ckpt_path1 toma la entrada del usuario (por ejemplo, la ruta a un modelo) y la pasa a la función show_info en process_ckpt.py, que la utiliza para cargar el modelo en esa ruta con torch.load, lo que puede provocar una deserialización insegura y la ejecución remota de código. Al momento de la publicación, no se conocen parches.
First Time Rvc-project
Rvc-project retrieval-based-voice-conversion-webui
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

05 May 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-05 18:15

Updated : 2025-08-01 16:54


NVD link : CVE-2025-43846

Mitre link : CVE-2025-43846

CVE.ORG link : CVE-2025-43846


JSON object : View

Products Affected

rvc-project

  • retrieval-based-voice-conversion-webui
CWE
CWE-502

Deserialization of Untrusted Data