Skip to main content

CVE-2025-43852: CWE-502: Deserialization of Untrusted Data in RVC-Project Retrieval-based-Voice-Conversion-WebUI

High
VulnerabilityCVE-2025-43852cvecve-2025-43852cwe-502
Published: Mon May 05 2025 (05/05/2025, 18:21:36 UTC)
Source: CVE
Vendor/Project: RVC-Project
Product: Retrieval-based-Voice-Conversion-WebUI

Description

Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , if model_name contains the string "DeEcho", a new instance of AudioPreDeEcho class is created with the model_path attribute containing the aforementioned user input. In the AudioPreDeEcho class, the user input is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.

AI-Powered Analysis

AILast updated: 07/05/2025, 19:40:47 UTC

Technical Analysis

CVE-2025-43852 is a high-severity vulnerability affecting the Retrieval-based-Voice-Conversion-WebUI (RVC-Project), a voice changing framework based on VITS technology. The vulnerability arises from unsafe deserialization of untrusted data, specifically in versions 2.2.231006 and earlier. The core issue is that the 'model_choose' variable accepts user input, such as a path to a model, which is then passed to the 'uvr' function in the 'vr.py' module. Within this function, if the 'model_name' contains the substring 'DeEcho', an instance of the AudioPreDeEcho class is created with the user-supplied model path. The AudioPreDeEcho class uses this path to load the model via the 'torch.load' function. Since 'torch.load' deserializes the model file, if the input is maliciously crafted, it can lead to unsafe deserialization, allowing an attacker to execute arbitrary code remotely without authentication or user interaction. This vulnerability is particularly dangerous because it allows remote code execution (RCE) with no privileges required and no user interaction, making exploitation straightforward once the vulnerable service is exposed. As of the publication date, no patches or mitigations have been released, and no known exploits have been observed in the wild. The CVSS 4.0 score of 8.9 reflects the critical nature of this flaw, highlighting its network attack vector, low complexity, and high impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using the Retrieval-based-Voice-Conversion-WebUI in production or research environments. Successful exploitation could lead to full system compromise, data theft, or disruption of voice conversion services. This could impact sectors relying on voice technologies, such as telecommunications, media production, accessibility services, and AI research institutions. The ability to execute arbitrary code remotely without authentication means attackers could deploy malware, pivot within networks, or exfiltrate sensitive data. Given the increasing adoption of AI and voice technologies in Europe, the vulnerability could undermine trust in voice conversion tools and cause operational downtime. Additionally, organizations subject to GDPR and other data protection regulations could face compliance issues if personal data is compromised due to this vulnerability.

Mitigation Recommendations

Since no official patches are currently available, European organizations should take immediate practical steps to mitigate risk. First, restrict network exposure of the Retrieval-based-Voice-Conversion-WebUI service by implementing strict firewall rules and network segmentation to limit access only to trusted users and systems. Second, implement input validation and sanitization at the application layer to prevent untrusted user input from reaching the deserialization function. Third, consider disabling or removing the functionality that loads models dynamically from user-supplied paths, or run the service in a sandboxed environment with minimal privileges to contain potential exploitation. Fourth, monitor logs and network traffic for unusual activity indicative of exploitation attempts. Finally, maintain close communication with the RVC-Project maintainers for updates and apply patches immediately once they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-17T20:07:08.555Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdaed5

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 7:40:47 PM

Last updated: 8/16/2025, 4:43:56 AM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats