Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path0 variable takes user input (e.g. a path to a model) and passes it to the change_info function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rvc-project
Rvc-project retrieval-based-voice-conversion-webui |
|
| CPEs | cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rvc-project
Rvc-project retrieval-based-voice-conversion-webui |
|
| Metrics |
cvssV3_1
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 05 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 May 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path0 variable takes user input (e.g. a path to a model) and passes it to the change_info function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist. | |
| Title | GHSL-2025-018_Retrieval-based-Voice-Conversion-WebUI | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-05T17:54:58.884Z
Updated: 2025-05-05T18:25:04.426Z
Reserved: 2025-04-17T20:07:08.554Z
Link: CVE-2025-43848
Updated: 2025-05-05T18:24:52.385Z
Status : Analyzed
Published: 2025-05-05T18:15:42.683
Modified: 2025-08-01T16:54:34.663
Link: CVE-2025-43848
No data.