CVE-2025-49837

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPre. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPre class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPre class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*

History

30 Jul 2025, 20:12

Type Values Removed Values Added
First Time Rvc-boss gpt-sovits-webui
Rvc-boss
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/vr.py#L32 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/vr.py#L32 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L157 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L157 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L192-L205 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L192-L205 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L64-L70 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L64-L70 - Product
References () https://securitylab.github.com/advisories/GHSL-2025-049_GHSL-2025-053_RVC-Boss_GPT-SoVITS/ - () https://securitylab.github.com/advisories/GHSL-2025-049_GHSL-2025-053_RVC-Boss_GPT-SoVITS/ - Exploit, Third Party Advisory

16 Jul 2025, 14:58

Type Values Removed Values Added
Summary
  • (es) GPT-SoVITS-WebUI es una interfaz web de conversión de voz y texto a voz. En las versiones 20250228v3 y anteriores, existe una vulnerabilidad de deserialización insegura en vr.py AudioPre. La variable model_choose recibe la entrada del usuario (por ejemplo, la ruta a un modelo) y la pasa a la función uvr. En uvr, se crea una nueva instancia de la clase AudioPre con el atributo model_path que contiene la entrada del usuario mencionada (aquí denominada localmente como model_name). Tenga en cuenta que en este paso se añade la extensión .pth a la ruta. En la clase AudioPre, la entrada del usuario, aquí denominada model_path, se utiliza para cargar el modelo en esa ruta con torch.load, lo que puede provocar una deserialización insegura. Al momento de la publicación, no se conocen versiones parcheadas.

15 Jul 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 21:15

Updated : 2025-07-30 20:12


NVD link : CVE-2025-49837

Mitre link : CVE-2025-49837

CVE.ORG link : CVE-2025-49837


JSON object : View

Products Affected

rvc-boss

  • gpt-sovits-webui
CWE
CWE-502

Deserialization of Untrusted Data