First published: Mon May 05 2025(Updated: )
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to the extract_small_model function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Retrieval-based Voice Conversion WebUI | <2.2.231006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43847 is categorized as a high-severity vulnerability due to the potential for unsafe deserialization.
To fix CVE-2025-43847, upgrade the Retrieval-based Voice Conversion WebUI to version 2.2.231007 or later.
CVE-2025-43847 affects Retrieval-based Voice Conversion WebUI versions up to and including 2.2.231006.
The risks associated with CVE-2025-43847 include execution of arbitrary code and compromise of the application environment.
CVE-2025-43847 is triggered by user input via the ckpt_path2 variable, which affects model extraction in the application.