{"vulnerability": "cve-2025-4384", "sightings": [{"uuid": "470d8201-088a-452b-9886-6ebd39acbeaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43849", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loh6qrf5gq2n", "content": "", "creation_timestamp": "2025-05-05T20:16:44.447938Z"}, {"uuid": "1ecb4359-5981-45b7-8485-12f85f771a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43842", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14927", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43842\n\ud83d\udd25 CVSS Score: 8.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables\u00a0exp_dir1,\u00a0np7,\u00a0trainset_dir4\u00a0and\u00a0sr2\u00a0take user input and\u00a0pass\u00a0it to the\u00a0preprocess_dataset\u00a0function, which\u00a0concatenates them into a command\u00a0that is\u00a0run\u00a0on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.\n\ud83d\udccf Published: 2025-05-05T17:08:48.481Z\n\ud83d\udccf Modified: 2025-05-05T17:08:48.481Z\n\ud83d\udd17 References:\n1. https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/\n2. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L1227-L1232\n3. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L223-L232\n4. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L235", "creation_timestamp": "2025-05-05T17:20:10.000000Z"}, {"uuid": "a0319128-41b8-4f91-9c1f-9f6bca8c2dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43848", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14956", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43848\n\ud83d\udd25 CVSS Score: 8.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The\u00a0ckpt_path0\u00a0variable\u00a0takes user input\u00a0(e.g. a path to a model) and\u00a0passes\u00a0it to the\u00a0change_info\u00a0function in\u00a0process_ckpt.py, which uses it to\u00a0load the model on that path with\u00a0torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.\n\ud83d\udccf Published: 2025-05-05T17:54:58.884Z\n\ud83d\udccf Modified: 2025-05-05T17:54:58.884Z\n\ud83d\udd17 References:\n1. https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/\n2. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer/lib/train/process_ckpt.py#L196\n3. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1415\n4. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1431", "creation_timestamp": "2025-05-05T18:19:41.000000Z"}, {"uuid": "793152bf-3097-4152-a403-d313de116443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15154", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4384\n\ud83d\udd25 CVSS Score: 6 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/RE:M/U:Green)\n\ud83d\udd39 Description: The MQTT add-on of PcVue fails to verify that a remote device\u2019s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly.\n\nThe use of a client certificate reduces the risk for random devices to take advantage of this flaw.\n\ud83d\udccf Published: 2025-05-06T15:59:27.839Z\n\ud83d\udccf Modified: 2025-05-06T15:59:27.839Z\n\ud83d\udd17 References:\n1. https://www.pcvue.com/security/#SB2025-3", "creation_timestamp": "2025-05-06T16:21:57.000000Z"}, {"uuid": "2c10a55a-6461-4573-8eb5-ef6ed3168bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43849", "type": "published-proof-of-concept", "source": "Telegram/4ybX3uzHn196N4ZX40WWFSYjrgaegjcyI_GLUDry13ex5SY", "content": "", "creation_timestamp": "2025-05-05T21:33:05.000000Z"}, {"uuid": "9634a5cf-7d3a-4506-bc8a-8d93b06f1030", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43840", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16896", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43840\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Ref CheckBot allows Stored XSS.This issue affects CheckBot: from n/a through 1.05.\n\ud83d\udccf Published: 2025-05-19T17:07:20.828Z\n\ud83d\udccf Modified: 2025-05-19T17:07:20.828Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/checkbot/vulnerability/wordpress-checkbot-plugin-1-05-csrf-to-stored-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T17:39:07.000000Z"}, {"uuid": "32eab982-8927-4eb1-b33a-3f2ce372e403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43841", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16895", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43841\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jamesdbruner WP Vegas allows Stored XSS.This issue affects WP Vegas: from n/a through 2.2.\n\ud83d\udccf Published: 2025-05-19T17:08:41.224Z\n\ud83d\udccf Modified: 2025-05-19T17:08:41.224Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/vegas-fullscreen-background-slider/vulnerability/wordpress-wp-vegas-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T17:39:06.000000Z"}, {"uuid": "a1b97f90-cf2d-4b73-b609-9cceff180d26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43843", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14922", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43843\n\ud83d\udd25 CVSS Score: 8.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables\u00a0exp_dir1,\u00a0np7\u00a0and\u00a0f0method8\u00a0take user input and\u00a0pass\u00a0it into the\u00a0extract_f0_feature\u00a0function, which\u00a0concatenates them into a command\u00a0that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist.\n\ud83d\udccf Published: 2025-05-05T17:09:35.032Z\n\ud83d\udccf Modified: 2025-05-05T17:09:35.032Z\n\ud83d\udd17 References:\n1. https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/\n2. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L1276-L1289\n3. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L265-L274\n4. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L276-L278\n5. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L307-L309\n6. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L330-L332\n7. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer-web.py#L373-L375", "creation_timestamp": "2025-05-05T17:20:02.000000Z"}, {"uuid": "4c36be21-cb84-42ba-b56e-eb1328f19abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43849", "type": "seen", "source": "https://t.me/cvedetector/24492", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43849 - Apache TTS Voice Conversion Framework Deserialization RCE\", \n  \"Content\": \"CVE ID : CVE-2025-43849 \nPublished : May 5, 2025, 7:15 p.m. | 20\u00a0minutes ago \nDescription : Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The\u00a0ckpt_a\u00a0and\u00a0cpkt_b\u00a0variables take user input\u00a0(e.g. a path to a model) and\u00a0pass\u00a0it to the\u00a0merge\u00a0function in\u00a0process_ckpt.py, which uses them to\u00a0load the models on those paths with\u00a0torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T21:44:33.000000Z"}, {"uuid": "bbde6198-5a2d-443e-8eee-43a7308f3273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4384", "type": "seen", "source": "https://t.me/cvedetector/24630", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4384 - PcVue MQTT Certificate Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-4384 \nPublished : May 6, 2025, 4:15 p.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : The MQTT add-on of PcVue fails to verify that a remote device\u2019s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly.  \n  \nThe use of a client certificate reduces the risk for random devices to take advantage of this flaw. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:24.000000Z"}, {"uuid": "d5589ca0-cc5d-478f-bd45-b3624fdea7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43843", "type": "seen", "source": "https://t.me/cvedetector/24457", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43843 - Adobe Retrieval-based-Voice-Conversion-WebUI Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43843 \nPublished : May 5, 2025, 5:18 p.m. | 16\u00a0minutes ago \nDescription : Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables\u00a0exp_dir1,\u00a0np7\u00a0and\u00a0f0method8\u00a0take user input and\u00a0pass\u00a0it into the\u00a0extract_f0_feature\u00a0function, which\u00a0concatenates them into a command\u00a0that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T20:03:31.000000Z"}, {"uuid": "2f34a916-a36f-47ea-baf6-88436d36cfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43842", "type": "seen", "source": "https://t.me/cvedetector/24460", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43842 - Apache Retrieval-based-Voice-Conversion-WebUI Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43842 \nPublished : May 5, 2025, 5:18 p.m. | 16\u00a0minutes ago \nDescription : Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables\u00a0exp_dir1,\u00a0np7,\u00a0trainset_dir4\u00a0and\u00a0sr2\u00a0take user input and\u00a0pass\u00a0it to the\u00a0preprocess_dataset\u00a0function, which\u00a0concatenates them into a command\u00a0that is\u00a0run\u00a0on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T20:03:34.000000Z"}]}