Skip to main content

CVE-2025-43850: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI

High
VulnerabilityCVE-2025-43850cvecve-2025-43850cwe-502
Published: Mon May 05 2025 (05/05/2025, 18:20:57 UTC)
Source: CVE
Vendor/Project: RVC-Project
Product: Retrieval-based-Voice-Conversion-WebUI

Description

Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.

AI-Powered Analysis

AILast updated: 07/05/2025, 19:40:20 UTC

Technical Analysis

CVE-2025-43850 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data, specifically in versions 2.2.231006 and earlier. The issue centers on the 'ckpt_dir' variable, which accepts user input representing a path to a model file. This input is passed to the 'change_info' function in the 'export.py' script, which subsequently loads the model using the PyTorch 'torch.load' function. Since 'torch.load' deserializes the model file, if an attacker controls the input path, they can supply a maliciously crafted model file that triggers unsafe deserialization, potentially leading to remote code execution (RCE) without requiring any authentication or user interaction. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a common vector for executing arbitrary code when deserialization routines do not properly validate or sanitize input data. At the time of publication, no patches or fixes are available, and no known exploits have been observed in the wild. The CVSS 4.0 base score is 8.9 (high), reflecting the network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. This vulnerability poses a significant risk to any deployment of the RVC-Project Retrieval-based-Voice-Conversion-WebUI, especially in environments where untrusted users can influence the 'ckpt_dir' input or upload model files. Attackers exploiting this flaw could execute arbitrary code on the host system, potentially leading to full system compromise, data theft, or disruption of voice conversion services.

Potential Impact

For European organizations using the Retrieval-based-Voice-Conversion-WebUI, this vulnerability could have severe consequences. Voice conversion frameworks are often used in multimedia production, telecommunications, accessibility services, and AI research. A successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive systems, exfiltrate data, or disrupt services. This is particularly critical for organizations handling personal data protected under GDPR, as a breach could result in regulatory penalties and reputational damage. Furthermore, compromised voice conversion systems could be leveraged to manipulate audio outputs, potentially facilitating social engineering or fraud. The lack of authentication and user interaction requirements means that attackers can exploit this vulnerability remotely and stealthily, increasing the risk of widespread impact. Given the high CVSS score and the absence of patches, European entities relying on this software must consider the threat urgent and prioritize mitigation to avoid operational and compliance risks.

Mitigation Recommendations

Since no official patches are available, European organizations should implement immediate compensating controls. First, restrict access to the Retrieval-based-Voice-Conversion-WebUI to trusted internal networks and authenticated users only, minimizing exposure to untrusted inputs. Implement strict input validation and sanitization on the 'ckpt_dir' parameter to prevent arbitrary file paths or untrusted model files from being loaded. Where possible, disable or sandbox the 'torch.load' functionality or replace it with safer deserialization methods that verify model integrity and provenance. Monitor logs for unusual file load activities or unexpected process executions related to the voice conversion service. Employ network-level controls such as firewalls and intrusion detection systems to detect and block suspicious traffic targeting the service. Additionally, consider isolating the voice conversion environment using containerization or virtual machines to limit the blast radius of potential exploitation. Stay alert for vendor updates or community patches addressing this vulnerability and plan for rapid deployment once available. Finally, conduct security awareness training for developers and administrators on the risks of unsafe deserialization and secure coding practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-17T20:07:08.555Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdaecd

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 7:40:20 PM

Last updated: 7/30/2025, 6:20:57 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats