The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-43852

CVE-2025-43852: RVC WebUI RCE Vulnerability via Unsafe

CVE-2025-43852 is an unsafe deserialization vulnerability in Retrieval-based-Voice-Conversion-WebUI that enables remote code execution through malicious model files. This article covers technical details, affected versions, and mitigation.

Published: March 18, 2026

CVE-2025-43852 Overview

CVE-2025-43852 is a critical insecure deserialization vulnerability affecting Retrieval-based-Voice-Conversion-WebUI, a popular voice changing framework based on VITS (Variational Inference with adversarial learning for end-to-end Text-to-Speech). The vulnerability exists in versions 2.2.231006 and prior, where user-controlled input is passed directly to torch.load() without proper validation, enabling remote code execution through malicious pickle payloads.

The vulnerability stems from improper handling of user-supplied model paths in the voice conversion pipeline. When a user specifies a model path containing the string "DeEcho", the application instantiates an AudioPreDeEcho class that loads the model using PyTorch's torch.load() function. This function is known to be unsafe when loading untrusted data, as it can deserialize arbitrary Python objects, allowing attackers to execute malicious code on the target system.

Critical Impact

Remote attackers can achieve arbitrary code execution by supplying a malicious model file, potentially leading to complete system compromise, data exfiltration, or use of the system for further attacks.

Affected Products

  • Retrieval-based-Voice-Conversion-WebUI versions 2.2.231006 and prior
  • rvc-project retrieval-based-voice-conversion-webui (all versions without patch)

Discovery Timeline

  • May 5, 2025 - CVE-2025-43852 published to NVD
  • August 1, 2025 - Last updated in NVD database

Technical Details for CVE-2025-43852

Vulnerability Analysis

This insecure deserialization vulnerability (CWE-502) allows unauthenticated remote attackers to execute arbitrary code on systems running vulnerable versions of Retrieval-based-Voice-Conversion-WebUI. The attack requires no user interaction and can be exploited over the network, making it particularly dangerous for publicly accessible deployments.

The vulnerability chain begins in infer-web.py where the model_choose variable accepts user input specifying a path to a voice model. This input flows through the application without sanitization to the uvr function in vr.py. When the model name contains the substring "DeEcho", the code path leads to instantiation of the AudioPreDeEcho class, which uses the attacker-controlled path to load a model file via torch.load().

PyTorch's torch.load() function uses Python's pickle module for deserialization, which is inherently unsafe for untrusted data. Pickle can execute arbitrary Python code during deserialization through the __reduce__ method, allowing attackers to craft malicious model files that execute commands when loaded.

Root Cause

The root cause of this vulnerability is the use of torch.load() to deserialize user-supplied model files without validation or sandboxing. The torch.load() function relies on Python's pickle module, which can execute arbitrary code during object reconstruction. The application fails to implement proper input validation on the model path and does not use safer alternatives like torch.load() with weights_only=True or other serialization formats that don't support arbitrary code execution.

Attack Vector

The attack vector is network-based, requiring an attacker to either:

  1. Supply a malicious model file path that points to an attacker-controlled file (if the application allows remote file loading)
  2. Upload a malicious model file to a location accessible by the application and reference it through the model_choose parameter
  3. Exploit path traversal or other file access mechanisms to reference a planted malicious model

The vulnerable code path is triggered when processing voice conversion requests that involve DeEcho functionality. An attacker crafts a malicious pickle payload disguised as a model file, which when loaded by torch.load(), executes arbitrary Python code with the privileges of the application process.

The vulnerability exists in the vr.py file at the torch.load() call within the AudioPreDeEcho class initialization, where user input flows from infer-web.py through the uvr function. For technical details, refer to the GitHub Security Advisory and the vulnerable code in vr.py.

Detection Methods for CVE-2025-43852

Indicators of Compromise

  • Unexpected model files appearing in model directories, particularly with "DeEcho" in the filename
  • Anomalous process spawning from Python processes running the WebUI application
  • Unusual network connections originating from the application server
  • Modified or newly created files in system directories following model loading operations
  • Unexpected Python pickle deserialization errors in application logs

Detection Strategies

  • Monitor for torch.load() calls with user-controllable paths in application traces
  • Implement file integrity monitoring on model directories to detect unauthorized model uploads
  • Use application-level logging to track model loading requests and flag paths containing unexpected characters or directory traversal sequences
  • Deploy endpoint detection and response (EDR) solutions to identify post-exploitation behavior
  • Analyze network traffic for unusual data exfiltration patterns from application servers

Monitoring Recommendations

  • Enable verbose logging for all model loading operations in the application
  • Implement real-time alerting on process creation events from the WebUI application context
  • Monitor system calls for suspicious activity patterns associated with pickle deserialization attacks
  • Set up honeypot model files to detect unauthorized access attempts
  • Configure SIEM rules to correlate model loading events with subsequent anomalous system behavior

How to Mitigate CVE-2025-43852

Immediate Actions Required

  • Restrict network access to Retrieval-based-Voice-Conversion-WebUI instances to trusted networks only
  • Implement strict input validation on all model path parameters, rejecting paths containing directory traversal sequences or pointing to untrusted locations
  • Run the application in a sandboxed environment with minimal privileges
  • Disable or remove DeEcho functionality if not required
  • Monitor the project repository for security patches and apply them immediately when available

Patch Information

As of the publication date, no official patch is available for this vulnerability. The vendor advisory at GitHub Security Lab provides additional details about the vulnerability scope. Organizations should monitor the official RVC-Project repository for security updates and consider implementing the workarounds below until a patch is released.

Workarounds

  • Modify the application code to use torch.load() with weights_only=True parameter to prevent arbitrary code execution during deserialization
  • Implement an allowlist of permitted model file paths and validate all user input against this list
  • Deploy the application behind a Web Application Firewall (WAF) with rules to filter malicious requests
  • Use containerization with read-only file systems for model directories to prevent malicious file placement
  • Implement network segmentation to isolate the application from sensitive internal resources
bash
# Example: Running application in restricted Docker container
docker run --read-only \
  --tmpfs /tmp \
  --security-opt no-new-privileges \
  --cap-drop ALL \
  --network none \
  rvc-webui:latest

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechRvc Project

  • SeverityHIGH

  • CVSS Score8.9

  • EPSS Probability6.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • GitHub Code Snippet

  • GitHub Code Snippet

  • GitHub Code Snippet
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2025-43851: RVC-WebUI Unsafe Deserialization Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English