CVE-2025-49841

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*

History

30 Jul 2025, 20:15

Type Values Removed Values Added
CPE cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Rvc-boss gpt-sovits-webui
Rvc-boss
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/GPT_SoVITS/inference_webui.py#L873 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/GPT_SoVITS/inference_webui.py#L873 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/GPT_SoVITS/inference_webui.py#L926 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/GPT_SoVITS/inference_webui.py#L926 - Product
References () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/GPT_SoVITS/process_ckpt.py#L100-L106 - () https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/GPT_SoVITS/process_ckpt.py#L100-L106 - Product
References () https://securitylab.github.com/advisories/GHSL-2025-049_GHSL-2025-053_RVC-Boss_GPT-SoVITS/ - () https://securitylab.github.com/advisories/GHSL-2025-049_GHSL-2025-053_RVC-Boss_GPT-SoVITS/ - Exploit, Third Party Advisory

16 Jul 2025, 14:58

Type Values Removed Values Added
Summary
  • (es) GPT-SoVITS-WebUI es una interfaz web de conversión de voz y texto a voz. En las versiones 20250228v3 y anteriores, existe una vulnerabilidad de deserialización insegura en process_ckpt.py. La variable SoVITS_dropdown recibe la entrada del usuario y la pasa a la función load_sovits_new de process_ckpt.py. En load_sovits_new, la entrada del usuario (en este caso, sovits_path) se utiliza para cargar un modelo con torch.load, lo que provoca una deserialización insegura. Al momento de la publicación, no se conocen versiones parcheadas.

15 Jul 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 21:15

Updated : 2025-07-30 20:15


NVD link : CVE-2025-49841

Mitre link : CVE-2025-49841

CVE.ORG link : CVE-2025-49841


JSON object : View

Products Affected

rvc-boss

  • gpt-sovits-webui
CWE
CWE-502

Deserialization of Untrusted Data