CVE-2025-49835

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_asr function. asr_inp_dir (and a number of other variables) takes user input, which is passed to the open_asr function, which concatenates the user input into a command and runs it on the server, leading to arbitrary command execution. At time of publication, no known patched versions are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*

History

30 Jul 2025, 20:12

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L1034 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L1034 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L331 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L331 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L341 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L341 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L920 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L920 - Product
References () https://securitylab.github.com/advisories/GHSL-2025-045_GHSL-2025-048_RVC-Boss_GPT-SoVITS/ - () https://securitylab.github.com/advisories/GHSL-2025-045_GHSL-2025-048_RVC-Boss_GPT-SoVITS/ - Vendor Advisory, Exploit
CPE cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*
First Time Rvc-boss gpt-sovits-webui
Rvc-boss

16 Jul 2025, 14:58

Type Values Removed Values Added
Summary
  • (es) GPT-SoVITS-WebUI es una interfaz web de conversión de voz y texto a voz. En las versiones 20250228v3 y anteriores, existe una vulnerabilidad de inyección de comandos en la función open_asr de webui.py. asr_inp_dir (y otras variables) recibe la entrada del usuario, que se pasa a la función open_asr, que la concatena en un comando y lo ejecuta en el servidor, lo que provoca la ejecución arbitraria de comandos. Al momento de la publicación, no se conocen versiones parcheadas.

15 Jul 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 21:15

Updated : 2025-07-30 20:12


NVD link : CVE-2025-49835

Mitre link : CVE-2025-49835

CVE.ORG link : CVE-2025-49835


JSON object : View

Products Affected

rvc-boss

  • gpt-sovits-webui
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')