CVE-2026-8755: fishaudio Bert-VITS2 Path Traversal Vulnerability

CVE-2026-8755: fishaudio Bert-VITS2 Path Traversal Vulnerability

The National Vulnerability Database has disclosed CVE-2026-8755, a path traversal vulnerability impacting fishaudio Bert-VITS2, specifically in versions up to commit 8f7fbd8c4770965225d258db548da27dc8dd934c. This flaw resides within the _get_all_models function of the hiyoriUI.py file, part of the Model Handler component. The vulnerability carries a CVSSv3.1 score of 7.3 (HIGH), indicating significant risk.

Attackers can exploit this remotely, leading to potential information disclosure, data manipulation, or even arbitrary code execution, depending on the context of the traversed paths. The National Vulnerability Database confirms that an exploit for this vulnerability has been published and is actively available, escalating the urgency for defenders. A critical challenge is that fishaudio Bert-VITS2 uses continuous delivery with rolling releases, meaning no specific affected or patched version details are available, making tracking and remediation difficult.

The vendor was reportedly contacted regarding this disclosure but has not provided a response. This lack of communication forces organizations using Bert-VITS2 to operate with heightened risk and limited official guidance. The attacker’s calculus here is straightforward: leverage a publicly available exploit against a product with poor versioning and an unresponsive vendor, ensuring a wider window of opportunity for compromise.

What This Means For You

  • If your organization uses fishaudio Bert-VITS2, assume you are vulnerable. Immediately assess your exposure to CVE-2026-8755. Given the lack of specific versioning and vendor response, the only secure path is to isolate deployments, review all input sanitization for the `_get_all_models` function or `hiyoriUI.py`, and implement robust egress filtering to prevent data exfiltration via path traversal. This is a critical unpatched risk.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-8755: Bert-VITS2 Path Traversal in Model Handler

Sigma YAML — free preview
title: CVE-2026-8755: Bert-VITS2 Path Traversal in Model Handler
id: scw-2026-05-17-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit the path traversal vulnerability in fishaudio Bert-VITS2's Model Handler. The rule specifically looks for URL encoding patterns commonly used in path traversal exploits within the URI and the presence of the 'model_name=' parameter, indicating an attempt to manipulate file paths.
author: SCW Feed Engine (AI-generated)
date: 2026-05-17
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-8755/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/..%252F..%252F'
          - '/..%255C..%255C'
          - '../..'
      cs-uri-query|contains:
          - 'model_name='
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-8755 Path Traversal fishaudio Bert-VITS2 up to commit 8f7fbd8c4770965225d258db548da27dc8dd934c
CVE-2026-8755 Path Traversal Vulnerable function: _get_all_models in hiyoriUI.py
CVE-2026-8755 Path Traversal Vulnerable component: Model Handler
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 17, 2026 at 16:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-20240 — Denial of Service

CVE-2026-20240 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129,...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-20
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data

CVE-2026-20239 — In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a...

vulnerabilityCVEhigh-severitycwe-532
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 5 IOCs /⚙ 4 Sigma

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data...

vulnerabilityCVEmedium-severitycwe-863
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma