Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7, trainset_dir4 and sr2 take user input and pass it to the preprocess_dataset function, which concatenates them into a command that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.
References
Configurations
History
No history.
Information
Published : 2025-05-05 17:18
Updated : 2025-08-01 16:55
NVD link : CVE-2025-43842
Mitre link : CVE-2025-43842
CVE.ORG link : CVE-2025-43842
JSON object : View
Products Affected
rvc-project
- retrieval-based-voice-conversion-webui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
