Unrated severityNVD Advisory· Published May 5, 2025· Updated May 5, 2025
GHSL-2025-012_Retrieval-based-Voice-Conversion-WebUI
CVE-2025-43842
Description
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7, trainset_dir4 and sr2 take user input and pass it to the preprocess_dataset function, which concatenates them into a command that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.
Affected products
2- Range: <=2.2.231006
- RVC-Project/Retrieval-based-Voice-Conversion-WebUIv5Range: <= 2.2.231006
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.pymitrex_refsource_MISC
- github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.pymitrex_refsource_MISC
- github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.pymitrex_refsource_MISC
- securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.