Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI
Vulnerability Description
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , if model_name contains the string "DeEcho", a new instance of AudioPreDeEcho class is created with the model_path attribute containing the aforementioned user input. In the AudioPreDeEcho class, the user input is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CVSS Information
N/A
Vulnerability Type
可信数据的反序列化
Vulnerability Title
Retrieval-based-Voice-Conversion-WebUI 代码问题漏洞
Vulnerability Description
Retrieval-based-Voice-Conversion-WebUI是RVC-Project开源的一个声音训练模型工具。 Retrieval-based-Voice-Conversion-WebUI 2.2.231006及之前版本存在代码问题漏洞,该漏洞源于model_choose变量处理不当,可能导致不安全的反序列化和远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A