Skip to main content

CVE-2025-49836: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RVC-Boss GPT-SoVITS

High
VulnerabilityCVE-2025-49836cvecve-2025-49836cwe-77
Published: Tue Jul 15 2025 (07/15/2025, 20:31:57 UTC)
Source: CVE Database V5
Vendor/Project: RVC-Boss
Product: GPT-SoVITS

Description

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py change_label function. path_list takes user input, which is passed to the change_label function, which concatenates the user input into a command and runs it on the server, leading to arbitrary command execution. At time of publication, no known patched versions are available.

AI-Powered Analysis

AILast updated: 07/23/2025, 01:46:45 UTC

Technical Analysis

CVE-2025-49836 is a critical command injection vulnerability identified in the GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability exists in versions 20250228v3 and earlier. Specifically, the flaw is located in the webui.py file within the change_label function. This function accepts user input via the path_list parameter, which is then concatenated directly into a system command executed on the server without proper sanitization or validation. This improper neutralization of special elements (CWE-77) allows an unauthenticated attacker to inject arbitrary commands that the server executes with the privileges of the application. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.9 (high severity), reflecting the ease of exploitation and the significant impact on confidentiality, integrity, and availability. At the time of publication, no patches or mitigations have been released, increasing the risk of exploitation once proof-of-concept or exploit code becomes available. Although no known exploits are currently in the wild, the vulnerability’s nature and exposure make it a prime target for attackers aiming to gain control over affected systems, execute arbitrary code, or pivot within networks hosting GPT-SoVITS-WebUI instances.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Organizations using GPT-SoVITS-WebUI for voice conversion or text-to-speech services may face full system compromise if exploited, leading to unauthorized data access, data manipulation, or service disruption. This could affect sectors relying on voice technologies, such as telecommunications, media, accessibility services, and customer support centers. The ability to execute arbitrary commands remotely without authentication means attackers can deploy malware, ransomware, or use the compromised system as a foothold for lateral movement within corporate networks. Additionally, the compromise of voice-related services could lead to privacy violations, intellectual property theft, and reputational damage. Given the growing adoption of AI-driven voice technologies in Europe, the vulnerability poses a significant risk to both private enterprises and public sector entities.

Mitigation Recommendations

Immediate mitigation steps include isolating the GPT-SoVITS-WebUI instances from public networks to limit exposure. Organizations should implement strict network segmentation and firewall rules to restrict access to the web UI to trusted internal users only. Until an official patch is available, administrators can audit and modify the webui.py source code to sanitize and validate all user inputs passed to the change_label function, employing safe command execution practices such as using parameterized calls or subprocess modules with argument lists instead of shell concatenation. Monitoring and logging all access to the web UI and command execution attempts can help detect exploitation attempts early. Employing application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious command injection patterns is advisable. Finally, organizations should prepare incident response plans specific to this vulnerability, including backups and recovery procedures, to minimize damage in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-11T14:33:57.799Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6876be14a83201eaacd0bd04

Added to database: 7/15/2025, 8:46:12 PM

Last enriched: 7/23/2025, 1:46:45 AM

Last updated: 8/30/2025, 4:41:36 PM

Views: 42

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats