Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7 and f0method8 take user input and pass it into the extract_f0_feature function, which concatenates them into a command that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.
References
Configurations
History
No history.
Information
Published : 2025-05-05 17:18
Updated : 2025-08-01 16:54
NVD link : CVE-2025-43843
Mitre link : CVE-2025-43843
CVE.ORG link : CVE-2025-43843
JSON object : View
Products Affected
rvc-project
- retrieval-based-voice-conversion-webui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
