CVE-2025-43850

Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:*

History

01 Aug 2025, 16:54

Type Values Removed Values Added
References () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer/modules/onnx/export.py#L7 - () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer/modules/onnx/export.py#L7 - Product
References () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1495 - () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1495 - Product
References () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1505 - () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1505 - Product
References () https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/ - () https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/ - Vendor Advisory
Summary
  • (es) Retrieval-based-Voice-Conversion-WebUI es un framework de conversión de voz basado en VITS. Las versiones 2.2.231006 y anteriores son vulnerables a la deserialización insegura. La variable ckpt_dir toma la entrada del usuario (por ejemplo, la ruta a un modelo) y la pasa a la función change_info en export.py, que la utiliza para cargar el modelo en esa ruta con torch.load, lo que puede provocar una deserialización insegura y la ejecución remota de código. Al momento de la publicación, no se conocían parches.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:*
First Time Rvc-project
Rvc-project retrieval-based-voice-conversion-webui

05 May 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-05 19:15

Updated : 2025-08-01 16:54


NVD link : CVE-2025-43850

Mitre link : CVE-2025-43850

CVE.ORG link : CVE-2025-43850


JSON object : View

Products Affected

rvc-project

  • retrieval-based-voice-conversion-webui
CWE
CWE-502

Deserialization of Untrusted Data