CVE-2025-43850: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
AI Analysis
Technical Summary
CVE-2025-43850 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data, specifically in versions 2.2.231006 and earlier. The issue centers on the 'ckpt_dir' variable, which accepts user input representing a path to a model file. This input is passed to the 'change_info' function in the 'export.py' script, which subsequently loads the model using the PyTorch 'torch.load' function. Since 'torch.load' deserializes the model file, if an attacker controls the input path, they can supply a maliciously crafted model file that triggers unsafe deserialization, potentially leading to remote code execution (RCE) without requiring any authentication or user interaction. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a common vector for executing arbitrary code when deserialization routines do not properly validate or sanitize input data. At the time of publication, no patches or fixes are available, and no known exploits have been observed in the wild. The CVSS 4.0 base score is 8.9 (high), reflecting the network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. This vulnerability poses a significant risk to any deployment of the RVC-Project Retrieval-based-Voice-Conversion-WebUI, especially in environments where untrusted users can influence the 'ckpt_dir' input or upload model files. Attackers exploiting this flaw could execute arbitrary code on the host system, potentially leading to full system compromise, data theft, or disruption of voice conversion services.
Potential Impact
For European organizations using the Retrieval-based-Voice-Conversion-WebUI, this vulnerability could have severe consequences. Voice conversion frameworks are often used in multimedia production, telecommunications, accessibility services, and AI research. A successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive systems, exfiltrate data, or disrupt services. This is particularly critical for organizations handling personal data protected under GDPR, as a breach could result in regulatory penalties and reputational damage. Furthermore, compromised voice conversion systems could be leveraged to manipulate audio outputs, potentially facilitating social engineering or fraud. The lack of authentication and user interaction requirements means that attackers can exploit this vulnerability remotely and stealthily, increasing the risk of widespread impact. Given the high CVSS score and the absence of patches, European entities relying on this software must consider the threat urgent and prioritize mitigation to avoid operational and compliance risks.
Mitigation Recommendations
Since no official patches are available, European organizations should implement immediate compensating controls. First, restrict access to the Retrieval-based-Voice-Conversion-WebUI to trusted internal networks and authenticated users only, minimizing exposure to untrusted inputs. Implement strict input validation and sanitization on the 'ckpt_dir' parameter to prevent arbitrary file paths or untrusted model files from being loaded. Where possible, disable or sandbox the 'torch.load' functionality or replace it with safer deserialization methods that verify model integrity and provenance. Monitor logs for unusual file load activities or unexpected process executions related to the voice conversion service. Employ network-level controls such as firewalls and intrusion detection systems to detect and block suspicious traffic targeting the service. Additionally, consider isolating the voice conversion environment using containerization or virtual machines to limit the blast radius of potential exploitation. Stay alert for vendor updates or community patches addressing this vulnerability and plan for rapid deployment once available. Finally, conduct security awareness training for developers and administrators on the risks of unsafe deserialization and secure coding practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-43850: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI
Description
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
AI-Powered Analysis
Technical Analysis
CVE-2025-43850 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data, specifically in versions 2.2.231006 and earlier. The issue centers on the 'ckpt_dir' variable, which accepts user input representing a path to a model file. This input is passed to the 'change_info' function in the 'export.py' script, which subsequently loads the model using the PyTorch 'torch.load' function. Since 'torch.load' deserializes the model file, if an attacker controls the input path, they can supply a maliciously crafted model file that triggers unsafe deserialization, potentially leading to remote code execution (RCE) without requiring any authentication or user interaction. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a common vector for executing arbitrary code when deserialization routines do not properly validate or sanitize input data. At the time of publication, no patches or fixes are available, and no known exploits have been observed in the wild. The CVSS 4.0 base score is 8.9 (high), reflecting the network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. This vulnerability poses a significant risk to any deployment of the RVC-Project Retrieval-based-Voice-Conversion-WebUI, especially in environments where untrusted users can influence the 'ckpt_dir' input or upload model files. Attackers exploiting this flaw could execute arbitrary code on the host system, potentially leading to full system compromise, data theft, or disruption of voice conversion services.
Potential Impact
For European organizations using the Retrieval-based-Voice-Conversion-WebUI, this vulnerability could have severe consequences. Voice conversion frameworks are often used in multimedia production, telecommunications, accessibility services, and AI research. A successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive systems, exfiltrate data, or disrupt services. This is particularly critical for organizations handling personal data protected under GDPR, as a breach could result in regulatory penalties and reputational damage. Furthermore, compromised voice conversion systems could be leveraged to manipulate audio outputs, potentially facilitating social engineering or fraud. The lack of authentication and user interaction requirements means that attackers can exploit this vulnerability remotely and stealthily, increasing the risk of widespread impact. Given the high CVSS score and the absence of patches, European entities relying on this software must consider the threat urgent and prioritize mitigation to avoid operational and compliance risks.
Mitigation Recommendations
Since no official patches are available, European organizations should implement immediate compensating controls. First, restrict access to the Retrieval-based-Voice-Conversion-WebUI to trusted internal networks and authenticated users only, minimizing exposure to untrusted inputs. Implement strict input validation and sanitization on the 'ckpt_dir' parameter to prevent arbitrary file paths or untrusted model files from being loaded. Where possible, disable or sandbox the 'torch.load' functionality or replace it with safer deserialization methods that verify model integrity and provenance. Monitor logs for unusual file load activities or unexpected process executions related to the voice conversion service. Employ network-level controls such as firewalls and intrusion detection systems to detect and block suspicious traffic targeting the service. Additionally, consider isolating the voice conversion environment using containerization or virtual machines to limit the blast radius of potential exploitation. Stay alert for vendor updates or community patches addressing this vulnerability and plan for rapid deployment once available. Finally, conduct security awareness training for developers and administrators on the risks of unsafe deserialization and secure coding practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-17T20:07:08.555Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaecd
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/5/2025, 7:40:20 PM
Last updated: 7/30/2025, 6:20:57 PM
Views: 12
Related Threats
CVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighTop Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.