No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in fishaudio Bert-VITS2 up to 8f7fbd8c4770965225d258db548da27dc8dd934c. The impacted element is the function generate_config of the file webui_preprocess.py of the component Gradio Interface. Such manipulation of the argument data_dir leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | fishaudio Bert-VITS2 Gradio webui_preprocess.py generate_config path traversal | |
| First Time appeared |
Fishaudio
Fishaudio bert-vits2 |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:fishaudio:bert-vits2:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fishaudio
Fishaudio bert-vits2 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-17T13:00:16.673Z
Reserved: 2026-05-16T17:36:57.785Z
Link: CVE-2026-8756
No data.
Status : Received
Published: 2026-05-17T13:16:46.410
Modified: 2026-05-17T13:16:46.410
Link: CVE-2026-8756
No data.
OpenCVE Enrichment
Updated: 2026-05-17T15:15:04Z