Skip to main content

CVE-2025-43847: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI

High
VulnerabilityCVE-2025-43847cvecve-2025-43847cwe-502
Published: Mon May 05 2025 (05/05/2025, 17:21:29 UTC)
Source: CVE
Vendor/Project: RVC-Project
Product: Retrieval-based-Voice-Conversion-WebUI

Description

Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to the extract_small_model function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.

AI-Powered Analysis

AILast updated: 07/05/2025, 19:41:50 UTC

Technical Analysis

CVE-2025-43847 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data in versions 2.2.231006 and earlier. Specifically, the variable ckpt_path2 accepts user input, such as a path to a model file, which is then passed to the extract_small_model function in the process_ckpt.py script. This function uses torch.load to load the model from the specified path. Since torch.load performs deserialization, if an attacker can control the input path and supply a maliciously crafted model file, they can trigger unsafe deserialization. This can lead to remote code execution (RCE) without requiring authentication or user interaction. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a common vector for code execution attacks due to the ability to execute arbitrary code during object deserialization. No patches or fixes are currently available at the time of publication, increasing the risk for users of affected versions. The CVSS 4.0 score of 8.9 reflects the critical nature of the vulnerability, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and severity suggest that attackers could develop exploits rapidly.

Potential Impact

For European organizations using the Retrieval-based-Voice-Conversion-WebUI, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise. This could result in data breaches, unauthorized access to sensitive voice data or models, disruption of voice conversion services, and lateral movement within networks. Organizations relying on voice conversion for customer interaction, accessibility, or multimedia production could face operational downtime and reputational damage. Since the vulnerability does not require authentication or user interaction, exposed services are at high risk. Additionally, if the compromised systems are integrated into larger communication or AI pipelines, the impact could cascade, affecting confidentiality and integrity of broader systems. The lack of available patches means organizations must rely on immediate mitigations to reduce exposure. The threat is particularly relevant for sectors with high adoption of AI voice technologies, including media, telecommunications, and research institutions across Europe.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict access to the Retrieval-based-Voice-Conversion-WebUI service by network segmentation and firewall rules to limit exposure to trusted users and internal networks only. 2) Implement strict input validation and sanitization on the ckpt_path2 parameter to prevent attackers from supplying arbitrary file paths or malicious model files. 3) Monitor and audit all model loading activities and file accesses related to torch.load to detect anomalous or unauthorized usage. 4) Consider disabling or sandboxing the torch.load functionality if feasible, or replacing it with safer deserialization methods that do not execute arbitrary code. 5) Employ application-layer firewalls or intrusion detection systems with signatures targeting suspicious deserialization patterns. 6) Maintain up-to-date backups and incident response plans to recover quickly in case of compromise. 7) Engage with the RVC-Project community and monitor for forthcoming patches or updates to apply them promptly. 8) If possible, isolate the voice conversion environment in containerized or virtualized environments to limit the blast radius of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-17T20:07:08.554Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdaf2c

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 7:41:50 PM

Last updated: 8/7/2025, 7:53:14 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats