CVE-2025-43847: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to the extract_small_model function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
AI Analysis
Technical Summary
CVE-2025-43847 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data in versions 2.2.231006 and earlier. Specifically, the variable ckpt_path2 accepts user input, such as a path to a model file, which is then passed to the extract_small_model function in the process_ckpt.py script. This function uses torch.load to load the model from the specified path. Since torch.load performs deserialization, if an attacker can control the input path and supply a maliciously crafted model file, they can trigger unsafe deserialization. This can lead to remote code execution (RCE) without requiring authentication or user interaction. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a common vector for code execution attacks due to the ability to execute arbitrary code during object deserialization. No patches or fixes are currently available at the time of publication, increasing the risk for users of affected versions. The CVSS 4.0 score of 8.9 reflects the critical nature of the vulnerability, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and severity suggest that attackers could develop exploits rapidly.
Potential Impact
For European organizations using the Retrieval-based-Voice-Conversion-WebUI, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise. This could result in data breaches, unauthorized access to sensitive voice data or models, disruption of voice conversion services, and lateral movement within networks. Organizations relying on voice conversion for customer interaction, accessibility, or multimedia production could face operational downtime and reputational damage. Since the vulnerability does not require authentication or user interaction, exposed services are at high risk. Additionally, if the compromised systems are integrated into larger communication or AI pipelines, the impact could cascade, affecting confidentiality and integrity of broader systems. The lack of available patches means organizations must rely on immediate mitigations to reduce exposure. The threat is particularly relevant for sectors with high adoption of AI voice technologies, including media, telecommunications, and research institutions across Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict access to the Retrieval-based-Voice-Conversion-WebUI service by network segmentation and firewall rules to limit exposure to trusted users and internal networks only. 2) Implement strict input validation and sanitization on the ckpt_path2 parameter to prevent attackers from supplying arbitrary file paths or malicious model files. 3) Monitor and audit all model loading activities and file accesses related to torch.load to detect anomalous or unauthorized usage. 4) Consider disabling or sandboxing the torch.load functionality if feasible, or replacing it with safer deserialization methods that do not execute arbitrary code. 5) Employ application-layer firewalls or intrusion detection systems with signatures targeting suspicious deserialization patterns. 6) Maintain up-to-date backups and incident response plans to recover quickly in case of compromise. 7) Engage with the RVC-Project community and monitor for forthcoming patches or updates to apply them promptly. 8) If possible, isolate the voice conversion environment in containerized or virtualized environments to limit the blast radius of potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-43847: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI
Description
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to the extract_small_model function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
AI-Powered Analysis
Technical Analysis
CVE-2025-43847 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data in versions 2.2.231006 and earlier. Specifically, the variable ckpt_path2 accepts user input, such as a path to a model file, which is then passed to the extract_small_model function in the process_ckpt.py script. This function uses torch.load to load the model from the specified path. Since torch.load performs deserialization, if an attacker can control the input path and supply a maliciously crafted model file, they can trigger unsafe deserialization. This can lead to remote code execution (RCE) without requiring authentication or user interaction. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a common vector for code execution attacks due to the ability to execute arbitrary code during object deserialization. No patches or fixes are currently available at the time of publication, increasing the risk for users of affected versions. The CVSS 4.0 score of 8.9 reflects the critical nature of the vulnerability, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and severity suggest that attackers could develop exploits rapidly.
Potential Impact
For European organizations using the Retrieval-based-Voice-Conversion-WebUI, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise. This could result in data breaches, unauthorized access to sensitive voice data or models, disruption of voice conversion services, and lateral movement within networks. Organizations relying on voice conversion for customer interaction, accessibility, or multimedia production could face operational downtime and reputational damage. Since the vulnerability does not require authentication or user interaction, exposed services are at high risk. Additionally, if the compromised systems are integrated into larger communication or AI pipelines, the impact could cascade, affecting confidentiality and integrity of broader systems. The lack of available patches means organizations must rely on immediate mitigations to reduce exposure. The threat is particularly relevant for sectors with high adoption of AI voice technologies, including media, telecommunications, and research institutions across Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict access to the Retrieval-based-Voice-Conversion-WebUI service by network segmentation and firewall rules to limit exposure to trusted users and internal networks only. 2) Implement strict input validation and sanitization on the ckpt_path2 parameter to prevent attackers from supplying arbitrary file paths or malicious model files. 3) Monitor and audit all model loading activities and file accesses related to torch.load to detect anomalous or unauthorized usage. 4) Consider disabling or sandboxing the torch.load functionality if feasible, or replacing it with safer deserialization methods that do not execute arbitrary code. 5) Employ application-layer firewalls or intrusion detection systems with signatures targeting suspicious deserialization patterns. 6) Maintain up-to-date backups and incident response plans to recover quickly in case of compromise. 7) Engage with the RVC-Project community and monitor for forthcoming patches or updates to apply them promptly. 8) If possible, isolate the voice conversion environment in containerized or virtualized environments to limit the blast radius of potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-17T20:07:08.554Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaf2c
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/5/2025, 7:41:50 PM
Last updated: 8/7/2025, 7:53:14 PM
Views: 16
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.