CVE-2025-49834: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RVC-Boss GPT-SoVITS
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_denoise function. denoise_inp_dir and denoise_opt_dir take user input, which is passed to the open_denoise function, which concatenates the user input into a command and runs it on the server, leading to arbitrary command execution. At time of publication, no known patched versions are available.
AI Analysis
Technical Summary
CVE-2025-49834 is a high-severity command injection vulnerability affecting the GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability exists in versions 20250228v3 and earlier. Specifically, the issue lies in the open_denoise function within the webui.py file. This function accepts user-supplied input parameters denoise_inp_dir and denoise_opt_dir, which are concatenated directly into a system command executed on the server without proper sanitization or neutralization of special characters. This improper handling of user input leads to CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'). An attacker can exploit this flaw by crafting malicious input that injects arbitrary commands, which the server executes with the privileges of the web application process. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. At the time of publication, no patches or mitigations have been released by the vendor, increasing the risk of exploitation once the vulnerability becomes widely known. The CVSS v4.0 base score is 8.9, reflecting the critical nature of the vulnerability due to its network attack vector, lack of required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild yet, but the ease of exploitation and severity suggest that attackers may develop exploits soon.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a significant risk. Successful exploitation allows attackers to execute arbitrary commands on the server hosting the web UI, potentially leading to full system compromise. This could result in unauthorized access to sensitive voice data, manipulation or theft of intellectual property related to voice conversion models, disruption of voice services, and lateral movement within internal networks. Given the nature of the product—handling voice conversion and text-to-speech—organizations in media, telecommunications, accessibility services, and AI research could be particularly impacted. The compromise of such systems could also lead to reputational damage and regulatory consequences under GDPR if personal data is exposed or manipulated. The lack of available patches means organizations must rely on immediate mitigations to reduce exposure. The vulnerability’s network accessibility and no requirement for authentication make it a prime target for automated attacks and wormable exploits, increasing the urgency for European entities to address this threat promptly.
Mitigation Recommendations
Since no official patches are available, European organizations should implement the following specific mitigations: 1) Immediately restrict network access to the GPT-SoVITS-WebUI server by implementing strict firewall rules and network segmentation to limit exposure to trusted internal users only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block command injection patterns targeting the denoise_inp_dir and denoise_opt_dir parameters. 3) Conduct code audits and, if feasible, modify the open_denoise function to sanitize and validate all user inputs rigorously, escaping or rejecting special characters that could be used for command injection. 4) Run the GPT-SoVITS-WebUI service with the least privileges possible, ideally within a container or sandbox environment to contain potential exploitation impact. 5) Monitor system and application logs for unusual command executions or anomalies indicating exploitation attempts. 6) Engage with the vendor or community to track patch releases and apply updates promptly once available. 7) Consider temporary disabling or replacing the vulnerable component if it is not critical to operations until a secure version is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Italy
CVE-2025-49834: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RVC-Boss GPT-SoVITS
Description
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_denoise function. denoise_inp_dir and denoise_opt_dir take user input, which is passed to the open_denoise function, which concatenates the user input into a command and runs it on the server, leading to arbitrary command execution. At time of publication, no known patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-49834 is a high-severity command injection vulnerability affecting the GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability exists in versions 20250228v3 and earlier. Specifically, the issue lies in the open_denoise function within the webui.py file. This function accepts user-supplied input parameters denoise_inp_dir and denoise_opt_dir, which are concatenated directly into a system command executed on the server without proper sanitization or neutralization of special characters. This improper handling of user input leads to CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'). An attacker can exploit this flaw by crafting malicious input that injects arbitrary commands, which the server executes with the privileges of the web application process. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. At the time of publication, no patches or mitigations have been released by the vendor, increasing the risk of exploitation once the vulnerability becomes widely known. The CVSS v4.0 base score is 8.9, reflecting the critical nature of the vulnerability due to its network attack vector, lack of required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild yet, but the ease of exploitation and severity suggest that attackers may develop exploits soon.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a significant risk. Successful exploitation allows attackers to execute arbitrary commands on the server hosting the web UI, potentially leading to full system compromise. This could result in unauthorized access to sensitive voice data, manipulation or theft of intellectual property related to voice conversion models, disruption of voice services, and lateral movement within internal networks. Given the nature of the product—handling voice conversion and text-to-speech—organizations in media, telecommunications, accessibility services, and AI research could be particularly impacted. The compromise of such systems could also lead to reputational damage and regulatory consequences under GDPR if personal data is exposed or manipulated. The lack of available patches means organizations must rely on immediate mitigations to reduce exposure. The vulnerability’s network accessibility and no requirement for authentication make it a prime target for automated attacks and wormable exploits, increasing the urgency for European entities to address this threat promptly.
Mitigation Recommendations
Since no official patches are available, European organizations should implement the following specific mitigations: 1) Immediately restrict network access to the GPT-SoVITS-WebUI server by implementing strict firewall rules and network segmentation to limit exposure to trusted internal users only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block command injection patterns targeting the denoise_inp_dir and denoise_opt_dir parameters. 3) Conduct code audits and, if feasible, modify the open_denoise function to sanitize and validate all user inputs rigorously, escaping or rejecting special characters that could be used for command injection. 4) Run the GPT-SoVITS-WebUI service with the least privileges possible, ideally within a container or sandbox environment to contain potential exploitation impact. 5) Monitor system and application logs for unusual command executions or anomalies indicating exploitation attempts. 6) Engage with the vendor or community to track patch releases and apply updates promptly once available. 7) Consider temporary disabling or replacing the vulnerable component if it is not critical to operations until a secure version is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-11T14:33:57.799Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6876be14a83201eaacd0bcf6
Added to database: 7/15/2025, 8:46:12 PM
Last enriched: 7/23/2025, 1:46:03 AM
Last updated: 8/27/2025, 3:48:35 PM
Views: 32
Related Threats
CVE-2025-9580: OS Command Injection in LB-LINK BL-X26
MediumCVE-2025-9582: Command Injection in Comfast CF-N1
MediumCVE-2025-6203: CWE-770: Allocation of Resources Without Limits or Throttling in HashiCorp Vault
HighCVE-2025-57219: n/a
MediumCVE-2025-57220: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.