First published: Mon May 05 2025(Updated: )
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , if model_name contains the string "DeEcho", a new instance of AudioPreDeEcho class is created with the model_path attribute containing the aforementioned user input. In the AudioPreDeEcho class, the user input is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Retrieval-based Voice Conversion WebUI | <=2.2.231006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43852 is considered a high-severity vulnerability due to its potential for unsafe deserialization.
To fix CVE-2025-43852, update Retrieval-based Voice Conversion WebUI to a version later than 2.2.231006.
CVE-2025-43852 affects Retrieval-based Voice Conversion WebUI versions up to and including 2.2.231006.
CVE-2025-43852 is a vulnerability related to unsafe deserialization.
CVE-2025-43852 can lead to potential code execution risks as it allows for unsafe user input handling.