Home » Database

AVID-2026-R1698

Description

GHSL-2025-013_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43843)

Details

Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7 and f0method8 take user input and pass it into the extract_f0_feature function, which concatenates them into a command that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.

Reason for inclusion in AVID: CVE-2025-43843 describes a remote command injection (RCE) vulnerability in the Retrieval-based-Voice-Conversion-WebUI, an AI/ML-focused web UI for voice conversion. It affects a software component used in AI pipelines (RVC-Project), enabling execution of arbitrary commands on the server. This is clearly an AI-related software vulnerability within the AI stack, relevant to the software supply chain (dependencies/tools used to deploy AI systems). The report provides specific vulnerability details, affected versions, and evidence (CVE/NVD references, code references), satisfying sufficient_evidence. No hardware/firmware-only aspects are involved.

References

Affected or Relevant Artifacts

  • Developer: RVC-Project
  • Deployer: RVC-Project
  • Artifact Details:
TypeName
SystemRetrieval-based-Voice-Conversion-WebUI

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-77CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-05-05
  • Version: 0.3.3
  • AVID Entry