First published: Mon May 05 2025(Updated: )
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_a and cpkt_b variables take user input (e.g. a path to a model) and pass it to the merge function in process_ckpt.py, which uses them to load the models on those paths with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Retrieval-based Voice Conversion Voice Conversion WebUI | <2.2.231006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43849 has a medium severity rating due to its potential for exploitation via unsafe deserialization.
To fix CVE-2025-43849, upgrade to Retrieval-based Voice Conversion WebUI version 2.2.231007 or later.
CVE-2025-43849 is classified as an unsafe deserialization vulnerability that affects user inputs in the framework.
Retrieval-based Voice Conversion WebUI versions 2.2.231006 and prior are affected by CVE-2025-43849.
Yes, CVE-2025-43849 can potentially lead to remote code execution if exploited by malicous actors.