Home » Database

AVID-2026-R1505

Description

fishaudio/Bert-VITS2 Command Injection in webui_preprocess.py bert_gen function (CVE-2024-39686)

Details

Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is used directly in a command executed with subprocess.run(cmd, shell=True) in the bert_gen function, which leads to arbitrary command execution. This affects fishaudio/Bert-VITS2 2.3 and earlier.

Reason for inclusion in AVID: CVE-2024-39686 describes an OS command injection in Bert-VITS2 (webui_preprocess.py bert_gen) where untrusted user input is used in a shell command via subprocess.run, enabling arbitrary code execution. This is a software vulnerability in an AI model/tooling package that sits in the AI software stack, with high impact. The report provides explicit evidence of the vulnerability and affected version(s). Therefore it is relevant for AVID curation as a software supply-chain vulnerability in general-purpose AI systems.

References

Affected or Relevant Artifacts

  • Developer: FishAudio
  • Deployer: FishAudio
  • Artifact Details:
TypeName
SystemBert-VITS2

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-78CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-07-22
  • Version: 0.3.3
  • AVID Entry