First published: Mon May 05 2025(Updated: )
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Retrieval-based Voice Conversion Voice Conversion WebUI | <2.2.231006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43850 has a high severity rating due to the risk of unsafe deserialization that could lead to remote code execution.
To mitigate CVE-2025-43850, upgrade the Retrieval-based Voice Conversion WebUI to version 2.2.231007 or higher.
CVE-2025-43850 affects versions of Retrieval-based Voice Conversion WebUI up to and including version 2.2.231006.
Unsafe deserialization in CVE-2025-43850 allows attackers to exploit user input, potentially executing arbitrary code when the application processes the input.
The impact of CVE-2025-43850 includes potential remote code execution, which can compromise system integrity and lead to unauthorized access.