{"id":"CVE-2024-39686","summary":"fishaudio/Bert-VITS2 Command Injection in webui_preprocess.py bert_gen function","details":"Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is used directly in a command executed with subprocess.run(cmd, shell=True) in the bert_gen function, which leads to arbitrary command execution. This affects fishaudio/Bert-VITS2 2.3 and earlier.","modified":"2026-04-30T12:11:42.875470Z","published":"2024-07-22T15:16:17.258Z","database_specific":{"cwe_ids":["CWE-78"],"unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"last_affected":"2.3"}]}],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39686.json"},"references":[{"type":"WEB","url":"https://github.com/fishaudio/Bert-VITS2/blob/3f8c537f4aeb281df3fb3c455eed9a1b64871a81/webui_preprocess.py#L82C9-L82C57"},{"type":"WEB","url":"https://github.com/fishaudio/Bert-VITS2/blob/76653b5b6d657143721df2ed6c5c246b4b1d9277/webui_preprocess.py#L130-L133"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39686.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39686"},{"type":"ADVISORY","url":"https://securitylab.github.com/advisories/GHSL-2024-045_GHSL-2024-047_fishaudio_Bert-VITS2/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fishaudio/bert-vits2","events":[{"introduced":"0"},{"last_affected":"76653b5b6d657143721df2ed6c5c246b4b1d9277"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.3"}]}}],"versions":["1.0","1.0.1","1.1","1.1.1","2.0.1","2.1","v2.0.2.1","v2.2","v2.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39686.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}