Skip to main content

CVE-2025-43848: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI

High
VulnerabilityCVE-2025-43848cvecve-2025-43848cwe-502
Published: Mon May 05 2025 (05/05/2025, 17:54:58 UTC)
Source: CVE
Vendor/Project: RVC-Project
Product: Retrieval-based-Voice-Conversion-WebUI

Description

Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path0 variable takes user input (e.g. a path to a model) and passes it to the change_info function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.

AI-Powered Analysis

AILast updated: 07/05/2025, 19:42:31 UTC

Technical Analysis

CVE-2025-43848 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data in versions 2.2.231006 and earlier. Specifically, the variable ckpt_path0 accepts user input, such as a path to a model file, which is then passed to the change_info function in the process_ckpt.py script. This function uses torch.load to load the model from the specified path. Since torch.load performs deserialization, if the input is crafted maliciously, it can lead to unsafe deserialization, enabling remote code execution (RCE) without requiring authentication or user interaction. This means an attacker can execute arbitrary code on the system running the vulnerable software simply by supplying a malicious model path. No patches or fixes are available at the time of publication, and no known exploits have been observed in the wild yet. The CVSS v4.0 base score is 8.9 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability is categorized under CWE-502 (Deserialization of Untrusted Data), a common and dangerous class of vulnerabilities that can lead to full system compromise if exploited successfully.

Potential Impact

For European organizations using the Retrieval-based-Voice-Conversion-WebUI, this vulnerability poses a significant risk. Since the software is designed for voice conversion, it may be deployed in environments handling sensitive audio data, including media production, telecommunications, or research institutions. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over affected systems, steal sensitive data, disrupt services, or pivot within the network. The lack of authentication and user interaction requirements makes it easier for attackers to exploit remotely, potentially leading to widespread compromise if exposed to the internet or accessible networks. This could result in data breaches, intellectual property theft, operational disruption, and reputational damage. Additionally, given the increasing adoption of AI and voice technologies in Europe, the impact could extend to critical sectors such as finance, healthcare, and government services that integrate voice conversion tools for accessibility or communication purposes.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict network access to the Retrieval-based-Voice-Conversion-WebUI instances, limiting exposure to trusted internal networks only. Employ strict input validation and sanitization on any user-supplied paths or model files to prevent malicious payloads from being loaded. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious deserialization attempts. Monitor logs for unusual torch.load invocations or unexpected file access patterns. If possible, isolate the service in a sandboxed or containerized environment with minimal privileges to limit the impact of potential exploitation. Organizations should also engage with the vendor or community to track patch releases and apply updates promptly once available. Finally, conduct security awareness training for developers and administrators about the risks of unsafe deserialization and secure coding practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-17T20:07:08.554Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdafd3

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 7:42:31 PM

Last updated: 8/6/2025, 7:43:19 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats