GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_denoise function. denoise_inp_dir and denoise_opt_dir take user input, which is passed to the open_denoise function, which concatenates the user input into a command and runs it on the server, leading to arbitrary command execution. At time of publication, no known patched versions are available.
References
Configurations
History
30 Jul 2025, 20:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rvc-boss gpt-sovits-webui
Rvc-boss |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:* | |
References | () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L1038 - Product | |
References | () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L362 - Product | |
References | () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L366 - Product | |
References | () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L909-L910 - Product | |
References | () https://securitylab.github.com/advisories/GHSL-2025-045_GHSL-2025-048_RVC-Boss_GPT-SoVITS/ - Exploit, Third Party Advisory |
16 Jul 2025, 14:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Jul 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-15 21:15
Updated : 2025-07-30 20:13
NVD link : CVE-2025-49834
Mitre link : CVE-2025-49834
CVE.ORG link : CVE-2025-49834
JSON object : View
Products Affected
rvc-boss
- gpt-sovits-webui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')