CVE-2025-49837: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPre. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPre class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPre class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
AI Analysis
Technical Summary
CVE-2025-49837 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the AudioPre class within the vr.py module. Specifically, the model_choose variable, which accepts user input representing a model path, is passed to the uvr function. Within uvr, an AudioPre instance is created with the model_path attribute set to this user input appended with a .pth extension. The AudioPre class then uses torch.load to load the model from this path. Since torch.load performs deserialization, if an attacker controls the input path and the contents of the file, they can craft malicious serialized objects that execute arbitrary code upon deserialization. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data). It requires no authentication or user interaction, can be exploited remotely over the network, and has a CVSS 4.0 score of 8.9, indicating a high impact on confidentiality, integrity, and availability. At the time of publication, no patches or mitigations have been released. No known exploits are currently observed in the wild, but the ease of exploitation and severity suggest a significant risk if weaponized.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a critical risk. Exploitation could lead to remote code execution on servers hosting the application, potentially allowing attackers to gain full control over affected systems. This can result in data breaches, unauthorized access to sensitive voice data, disruption of voice services, and lateral movement within networks. Organizations relying on voice conversion or text-to-speech for customer interaction, accessibility, or internal communications could face operational downtime and reputational damage. Given the lack of patches, organizations are exposed until mitigations are applied. The vulnerability's network accessibility and no requirement for authentication increase the likelihood of exploitation, especially in environments where the application is exposed to untrusted users or the internet.
Mitigation Recommendations
1. Immediately restrict access to GPT-SoVITS-WebUI instances to trusted internal networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on the model_choose parameter to prevent arbitrary file paths or untrusted inputs. 3. Disable or replace the use of torch.load for loading models with safer alternatives that do not perform arbitrary deserialization, such as using torch.jit.load or custom deserialization methods that validate input. 4. Monitor application logs for unusual or unexpected model loading requests or file access patterns. 5. Employ application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious payloads targeting this vulnerability. 6. Prepare for patch deployment by tracking vendor updates and applying them promptly once available. 7. Conduct security reviews and code audits of any custom modifications to the GPT-SoVITS-WebUI to identify similar unsafe deserialization patterns.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-49837: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
Description
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPre. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPre class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPre class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-49837 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the AudioPre class within the vr.py module. Specifically, the model_choose variable, which accepts user input representing a model path, is passed to the uvr function. Within uvr, an AudioPre instance is created with the model_path attribute set to this user input appended with a .pth extension. The AudioPre class then uses torch.load to load the model from this path. Since torch.load performs deserialization, if an attacker controls the input path and the contents of the file, they can craft malicious serialized objects that execute arbitrary code upon deserialization. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data). It requires no authentication or user interaction, can be exploited remotely over the network, and has a CVSS 4.0 score of 8.9, indicating a high impact on confidentiality, integrity, and availability. At the time of publication, no patches or mitigations have been released. No known exploits are currently observed in the wild, but the ease of exploitation and severity suggest a significant risk if weaponized.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a critical risk. Exploitation could lead to remote code execution on servers hosting the application, potentially allowing attackers to gain full control over affected systems. This can result in data breaches, unauthorized access to sensitive voice data, disruption of voice services, and lateral movement within networks. Organizations relying on voice conversion or text-to-speech for customer interaction, accessibility, or internal communications could face operational downtime and reputational damage. Given the lack of patches, organizations are exposed until mitigations are applied. The vulnerability's network accessibility and no requirement for authentication increase the likelihood of exploitation, especially in environments where the application is exposed to untrusted users or the internet.
Mitigation Recommendations
1. Immediately restrict access to GPT-SoVITS-WebUI instances to trusted internal networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on the model_choose parameter to prevent arbitrary file paths or untrusted inputs. 3. Disable or replace the use of torch.load for loading models with safer alternatives that do not perform arbitrary deserialization, such as using torch.jit.load or custom deserialization methods that validate input. 4. Monitor application logs for unusual or unexpected model loading requests or file access patterns. 5. Employ application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious payloads targeting this vulnerability. 6. Prepare for patch deployment by tracking vendor updates and applying them promptly once available. 7. Conduct security reviews and code audits of any custom modifications to the GPT-SoVITS-WebUI to identify similar unsafe deserialization patterns.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-11T14:33:57.799Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6876be14a83201eaacd0bcd8
Added to database: 7/15/2025, 8:46:12 PM
Last enriched: 7/23/2025, 1:47:02 AM
Last updated: 8/16/2025, 3:30:25 PM
Views: 17
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.