Description
A flaw has been found in fishaudio Bert-VITS2 up to 8f7fbd8c4770965225d258db548da27dc8dd934c. The affected element is the function _get_all_models of the file hiyoriUI.py of the component Model Handler. This manipulation causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-17
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw resides in the _get_all_models function of hiyoriUI.py inside the Bert‑VITS2 model handler. Input is improperly validated, allowing an attacker to craft a request that resolves to a file system path outside the intended directory. The vulnerability can be triggered remotely and an exploit for this flaw has already been published. Exploitation would allow an attacker to read or write arbitrary files on the host, potentially leading to execution of malicious code if critical system files are affected.

Affected Systems

The affected product is fishaudio Bert‑VITS2, with all releases up through commit 8f7fbd8c4770965225d258db548da27dc8dd934c. No patched version has been released yet and the vendor has not responded to disclosure, so affected versions cannot be further narrowed.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. An attacker can perform a remote attack by sending a specially crafted request to the _get_all_models endpoint, likely leveraging publicly available exploit code. Because path traversal directly exposes file contents or enables file modification, the risk is high if the application runs with elevated privileges or exposes sensitive data. Monitoring for anomalous file access and ensuring proper permissions are critical.

Generated by OpenCVE AI on May 17, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest patch or updated release of Bert‑VITS2 once one is available
  • Restrict the file system permissions of directories accessed by the model handler to the minimal required rights
  • Implement input validation or a reverse proxy to sanitize or block path traversal attempts to the _get_all_models endpoint

Generated by OpenCVE AI on May 17, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 13:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in fishaudio Bert-VITS2 up to 8f7fbd8c4770965225d258db548da27dc8dd934c. The affected element is the function _get_all_models of the file hiyoriUI.py of the component Model Handler. This manipulation causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Title fishaudio Bert-VITS2 Model hiyoriUI.py _get_all_models path traversal
First Time appeared Fishaudio
Fishaudio bert-vits2
Weaknesses CWE-22
CPEs cpe:2.3:a:fishaudio:bert-vits2:*:*:*:*:*:*:*:*
Vendors & Products Fishaudio
Fishaudio bert-vits2
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Fishaudio Bert-vits2
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-17T12:45:09.056Z

Reserved: 2026-05-16T17:36:54.626Z

Link: CVE-2026-8755

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:46.260

Modified: 2026-05-17T13:16:46.260

Link: CVE-2026-8755

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T14:45:03Z

Weaknesses