<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Fishaudio — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/fishaudio/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 13:20:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/fishaudio/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-8756: fishaudio Bert-VITS2 Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-8756-bert-vits2-path-traversal/</link><pubDate>Sun, 17 May 2026 13:20:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-8756-bert-vits2-path-traversal/</guid><description>A remote path traversal vulnerability exists in fishaudio Bert-VITS2's Gradio Interface, allowing attackers to manipulate the data_dir argument in the generate_config function of webui_preprocess.py.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-8756, affects fishaudio Bert-VITS2 up to commit 8f7fbd8c4770965225d258db548da27dc8dd934c. This vulnerability is located within the generate_config function of the webui_preprocess.py file, which is part of the Gradio Interface component. A remote attacker can exploit this vulnerability by manipulating the <code>data_dir</code> argument, potentially leading to unauthorized file access or modification. The exploit has been publicly disclosed and may be actively used. The vendor was contacted but did not respond to the disclosure. Due to the lack of versioning in this project, affected and unaffected releases are not clearly defined.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Bert-VITS2 instance running the vulnerable Gradio Interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>generate_config</code> function.</li>
<li>Within the request, the attacker manipulates the <code>data_dir</code> argument to include path traversal sequences (e.g., &ldquo;../&rdquo;).</li>
<li>The server-side application processes the request, unsafely concatenating the attacker-controlled <code>data_dir</code> value.</li>
<li>The application attempts to access a file or directory based on the manipulated path.</li>
<li>Due to the path traversal, the application accesses a resource outside of the intended directory.</li>
<li>The attacker gains unauthorized access to sensitive files or directories on the server.</li>
<li>The attacker may further exploit the accessed information to compromise the system, depending on the files retrieved.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to read sensitive files, potentially including configuration files, source code, or data used by the Bert-VITS2 application. The attacker could leverage this access to escalate privileges, compromise other systems on the network, or cause denial of service. The lack of versioning makes it difficult to determine the scope of vulnerable deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation to the <code>data_dir</code> argument in the <code>generate_config</code> function to prevent path traversal (reference: <code>webui_preprocess.py</code>).</li>
<li>Implement strict access controls to limit the files and directories that the Bert-VITS2 application can access.</li>
<li>Deploy the Sigma rule to detect potential exploitation attempts by monitoring for path traversal sequences in HTTP requests targeting the Gradio Interface.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (reference: webserver logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>path-traversal</category><category>web-application</category><category>cve-2026-8756</category></item></channel></rss>