Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rvc-project
Rvc-project retrieval-based-voice-conversion-webui |
|
CPEs | cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rvc-project
Rvc-project retrieval-based-voice-conversion-webui |
|
Metrics |
cvssV3_1
|
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 05 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 05 May 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist. | |
Title | GHSL-2025-020_Retrieval-based-Voice-Conversion-WebUI | |
Weaknesses | CWE-502 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-05T18:20:57.088Z
Updated: 2025-05-05T18:53:43.138Z
Reserved: 2025-04-17T20:07:08.555Z
Link: CVE-2025-43850

Updated: 2025-05-05T18:53:38.384Z

Status : Analyzed
Published: 2025-05-05T19:15:56.090
Modified: 2025-08-01T16:54:24.453
Link: CVE-2025-43850

No data.