Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, among others, take user input and pass it to the click_train function, which concatenates them into a command that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.
References
Configurations
History
01 Aug 2025, 16:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:rvc-project:retrieval-based-voice-conversion-webui:*:*:*:*:*:*:*:* | |
References | () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L1376-L1396 - Product | |
References | () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L571-L589 - Product | |
References | () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L591-L608 - Product | |
References | () https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L610 - Product | |
References | () https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/ - Vendor Advisory | |
First Time |
Rvc-project
Rvc-project retrieval-based-voice-conversion-webui |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
05 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-05 18:15
Updated : 2025-08-01 16:54
NVD link : CVE-2025-43844
Mitre link : CVE-2025-43844
CVE.ORG link : CVE-2025-43844
JSON object : View
Products Affected
rvc-project
- retrieval-based-voice-conversion-webui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')