CVE-2025-43851: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , a new instance of AudioPre class is created with the model_path attribute containing the aformentioned user input. In the AudioPre class, the user input, is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
AI Analysis
Technical Summary
CVE-2025-43851 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data in versions 2.2.231006 and earlier. Specifically, the 'model_choose' variable accepts user input, such as a path to a model file, which is then passed to the 'uvr' function in the 'vr.py' module. Within 'uvr', an instance of the 'AudioPre' class is created with the user-supplied 'model_path'. The 'AudioPre' class uses this path to load the model via the 'torch.load' function. Since 'torch.load' deserializes the model file, if an attacker supplies a maliciously crafted model file, it can trigger unsafe deserialization, leading to remote code execution (RCE) without requiring authentication or user interaction. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data) and has a CVSS 4.0 score of 8.9, indicating a high risk. No patches or mitigations are currently available, and no known exploits have been observed in the wild as of the publication date. The exploitability is high due to network attack vector, no privileges or user interaction required, and the potential impact spans confidentiality, integrity, and availability, as arbitrary code execution can compromise the entire system running the vulnerable software.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for entities using the Retrieval-based-Voice-Conversion-WebUI in production or research environments involving voice conversion or audio processing. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, disruption of services, or use of the compromised system as a pivot point for further attacks within the network. Given the nature of the software, organizations in media, telecommunications, AI research, and voice technology sectors are particularly at risk. The compromise of voice conversion systems could also lead to manipulation or spoofing of audio data, impacting trust and security in communications. The lack of patches increases the urgency for organizations to implement mitigations. Additionally, the vulnerability's network-exploitable nature means attackers can target exposed instances remotely, increasing the attack surface. The impact on confidentiality, integrity, and availability is high, potentially affecting sensitive data and critical services.
Mitigation Recommendations
Since no official patches are currently available, European organizations should adopt a multi-layered mitigation approach: 1) Immediately restrict network access to the Retrieval-based-Voice-Conversion-WebUI instances by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2) Disable or restrict the functionality that allows user-supplied model paths if possible, or validate and sanitize all user inputs rigorously before processing. 3) Employ application-level controls such as running the vulnerable application in a sandboxed or containerized environment with minimal privileges to contain potential exploitation. 4) Monitor logs and network traffic for unusual activity indicative of exploitation attempts, including unexpected model file uploads or access patterns. 5) Consider temporarily discontinuing use of the vulnerable software until a patch is released. 6) Engage with the vendor or open-source community to track patch developments and apply updates promptly once available. 7) Educate developers and administrators about the risks of unsafe deserialization and enforce secure coding practices to prevent similar vulnerabilities in future deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-43851: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI
Description
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , a new instance of AudioPre class is created with the model_path attribute containing the aformentioned user input. In the AudioPre class, the user input, is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
AI-Powered Analysis
Technical Analysis
CVE-2025-43851 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data in versions 2.2.231006 and earlier. Specifically, the 'model_choose' variable accepts user input, such as a path to a model file, which is then passed to the 'uvr' function in the 'vr.py' module. Within 'uvr', an instance of the 'AudioPre' class is created with the user-supplied 'model_path'. The 'AudioPre' class uses this path to load the model via the 'torch.load' function. Since 'torch.load' deserializes the model file, if an attacker supplies a maliciously crafted model file, it can trigger unsafe deserialization, leading to remote code execution (RCE) without requiring authentication or user interaction. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data) and has a CVSS 4.0 score of 8.9, indicating a high risk. No patches or mitigations are currently available, and no known exploits have been observed in the wild as of the publication date. The exploitability is high due to network attack vector, no privileges or user interaction required, and the potential impact spans confidentiality, integrity, and availability, as arbitrary code execution can compromise the entire system running the vulnerable software.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for entities using the Retrieval-based-Voice-Conversion-WebUI in production or research environments involving voice conversion or audio processing. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, disruption of services, or use of the compromised system as a pivot point for further attacks within the network. Given the nature of the software, organizations in media, telecommunications, AI research, and voice technology sectors are particularly at risk. The compromise of voice conversion systems could also lead to manipulation or spoofing of audio data, impacting trust and security in communications. The lack of patches increases the urgency for organizations to implement mitigations. Additionally, the vulnerability's network-exploitable nature means attackers can target exposed instances remotely, increasing the attack surface. The impact on confidentiality, integrity, and availability is high, potentially affecting sensitive data and critical services.
Mitigation Recommendations
Since no official patches are currently available, European organizations should adopt a multi-layered mitigation approach: 1) Immediately restrict network access to the Retrieval-based-Voice-Conversion-WebUI instances by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2) Disable or restrict the functionality that allows user-supplied model paths if possible, or validate and sanitize all user inputs rigorously before processing. 3) Employ application-level controls such as running the vulnerable application in a sandboxed or containerized environment with minimal privileges to contain potential exploitation. 4) Monitor logs and network traffic for unusual activity indicative of exploitation attempts, including unexpected model file uploads or access patterns. 5) Consider temporarily discontinuing use of the vulnerable software until a patch is released. 6) Engage with the vendor or open-source community to track patch developments and apply updates promptly once available. 7) Educate developers and administrators about the risks of unsafe deserialization and enforce secure coding practices to prevent similar vulnerabilities in future deployments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-17T20:07:08.555Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaed1
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/5/2025, 7:40:35 PM
Last updated: 7/31/2025, 4:47:43 AM
Views: 22
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.