CVE-2026-8755: fishaudio Bert-VITS2 Path Traversal Vulnerability
The National Vulnerability Database has disclosed CVE-2026-8755, a path traversal vulnerability impacting fishaudio Bert-VITS2, specifically in versions up to commit 8f7fbd8c4770965225d258db548da27dc8dd934c. This flaw resides within the _get_all_models function of the hiyoriUI.py file, part of the Model Handler component. The vulnerability carries a CVSSv3.1 score of 7.3 (HIGH), indicating significant risk.
Attackers can exploit this remotely, leading to potential information disclosure, data manipulation, or even arbitrary code execution, depending on the context of the traversed paths. The National Vulnerability Database confirms that an exploit for this vulnerability has been published and is actively available, escalating the urgency for defenders. A critical challenge is that fishaudio Bert-VITS2 uses continuous delivery with rolling releases, meaning no specific affected or patched version details are available, making tracking and remediation difficult.
The vendor was reportedly contacted regarding this disclosure but has not provided a response. This lack of communication forces organizations using Bert-VITS2 to operate with heightened risk and limited official guidance. The attacker’s calculus here is straightforward: leverage a publicly available exploit against a product with poor versioning and an unresponsive vendor, ensuring a wider window of opportunity for compromise.
What This Means For You
- If your organization uses fishaudio Bert-VITS2, assume you are vulnerable. Immediately assess your exposure to CVE-2026-8755. Given the lack of specific versioning and vendor response, the only secure path is to isolate deployments, review all input sanitization for the `_get_all_models` function or `hiyoriUI.py`, and implement robust egress filtering to prevent data exfiltration via path traversal. This is a critical unpatched risk.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-8755: Bert-VITS2 Path Traversal in Model Handler
title: CVE-2026-8755: Bert-VITS2 Path Traversal in Model Handler
id: scw-2026-05-17-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit the path traversal vulnerability in fishaudio Bert-VITS2's Model Handler. The rule specifically looks for URL encoding patterns commonly used in path traversal exploits within the URI and the presence of the 'model_name=' parameter, indicating an attempt to manipulate file paths.
author: SCW Feed Engine (AI-generated)
date: 2026-05-17
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-8755/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/..%252F..%252F'
- '/..%255C..%255C'
- '../..'
cs-uri-query|contains:
- 'model_name='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-8755 | Path Traversal | fishaudio Bert-VITS2 up to commit 8f7fbd8c4770965225d258db548da27dc8dd934c |
| CVE-2026-8755 | Path Traversal | Vulnerable function: _get_all_models in hiyoriUI.py |
| CVE-2026-8755 | Path Traversal | Vulnerable component: Model Handler |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 17, 2026 at 16:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.