CVE-2025-49839

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*

History

30 Jul 2025, 20:13

Type Values Removed Values Added
CPE cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Rvc-boss gpt-sovits-webui
Rvc-boss
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/bsroformer.py#L289 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/bsroformer.py#L289 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L157 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L157 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L192-L205 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L192-L205 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L52-L59 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py#L52-L59 - Product
References () https://securitylab.github.com/advisories/GHSL-2025-049_GHSL-2025-053_RVC-Boss_GPT-SoVITS/ - () https://securitylab.github.com/advisories/GHSL-2025-049_GHSL-2025-053_RVC-Boss_GPT-SoVITS/ - Exploit, Third Party Advisory

16 Jul 2025, 14:58

Type Values Removed Values Added
Summary
  • (es) GPT-SoVITS-WebUI es una interfaz web de conversión de voz y texto a voz. En las versiones 20250228v3 y anteriores, existe una vulnerabilidad de deserialización insegura en bsroformer.py. La variable model_choose recibe la entrada del usuario (por ejemplo, la ruta a un modelo) y la pasa a la función uvr. En uvr, se crea una nueva instancia de la clase Roformer_Loader con el atributo model_path que contiene la entrada del usuario mencionada (denominada localmente como model_name). Tenga en cuenta que en este paso se añade la extensión .ckpt a la ruta. En la clase Roformer_Loader, la entrada del usuario, denominada model_path, se utiliza para cargar el modelo en esa ruta con torch.load, lo que puede provocar una deserialización insegura. Al momento de la publicación, no se conocen versiones parcheadas.

15 Jul 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 21:15

Updated : 2025-07-30 20:13


NVD link : CVE-2025-49839

Mitre link : CVE-2025-49839

CVE.ORG link : CVE-2025-49839


JSON object : View

Products Affected

rvc-boss

  • gpt-sovits-webui
CWE
CWE-502

Deserialization of Untrusted Data