Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7, trainset_dir4 and sr2 take user input and pass it to the preprocess_dataset function, which concatenates them into a command that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.
References
Configurations
History
01 Aug 2025, 16:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L1227-L1232 - Product | |
References | () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L223-L232 - Product | |
References | () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L235 - Product | |
References | () https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/ - Vendor Advisory | |
Summary |
|
|
First Time |
Rvc-project
Rvc-project retrieval-based-voice-conversion-webui |
05 May 2025, 17:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-05 17:18
Updated : 2025-08-01 16:55
NVD link : CVE-2025-43842
Mitre link : CVE-2025-43842
CVE.ORG link : CVE-2025-43842
JSON object : View
Products Affected
rvc-project
- retrieval-based-voice-conversion-webui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')