First published: Mon May 05 2025(Updated: )
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , a new instance of AudioPre class is created with the model_path attribute containing the aformentioned user input. In the AudioPre class, the user input, is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Retrieval-based Voice Conversion WebUI | <2.2.231006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43851 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2025-43851, upgrade to version 2.2.231007 or later of the Retrieval-based Voice Conversion WebUI.
The impact of CVE-2025-43851 includes the risk of an attacker exploiting unsafe deserialization to execute arbitrary code.
CVE-2025-43851 affects versions 2.2.231006 and prior of the Retrieval-based Voice Conversion WebUI.
More information about CVE-2025-43851 can be found in the security advisory for the Retrieval-based Voice Conversion WebUI.