Skip to main content

CVE-2025-49837: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS

High
VulnerabilityCVE-2025-49837cvecve-2025-49837cwe-502
Published: Tue Jul 15 2025 (07/15/2025, 20:34:47 UTC)
Source: CVE Database V5
Vendor/Project: RVC-Boss
Product: GPT-SoVITS

Description

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPre. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPre class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPre class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.

AI-Powered Analysis

AILast updated: 07/23/2025, 01:47:02 UTC

Technical Analysis

CVE-2025-49837 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the AudioPre class within the vr.py module. Specifically, the model_choose variable, which accepts user input representing a model path, is passed to the uvr function. Within uvr, an AudioPre instance is created with the model_path attribute set to this user input appended with a .pth extension. The AudioPre class then uses torch.load to load the model from this path. Since torch.load performs deserialization, if an attacker controls the input path and the contents of the file, they can craft malicious serialized objects that execute arbitrary code upon deserialization. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data). It requires no authentication or user interaction, can be exploited remotely over the network, and has a CVSS 4.0 score of 8.9, indicating a high impact on confidentiality, integrity, and availability. At the time of publication, no patches or mitigations have been released. No known exploits are currently observed in the wild, but the ease of exploitation and severity suggest a significant risk if weaponized.

Potential Impact

For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a critical risk. Exploitation could lead to remote code execution on servers hosting the application, potentially allowing attackers to gain full control over affected systems. This can result in data breaches, unauthorized access to sensitive voice data, disruption of voice services, and lateral movement within networks. Organizations relying on voice conversion or text-to-speech for customer interaction, accessibility, or internal communications could face operational downtime and reputational damage. Given the lack of patches, organizations are exposed until mitigations are applied. The vulnerability's network accessibility and no requirement for authentication increase the likelihood of exploitation, especially in environments where the application is exposed to untrusted users or the internet.

Mitigation Recommendations

1. Immediately restrict access to GPT-SoVITS-WebUI instances to trusted internal networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on the model_choose parameter to prevent arbitrary file paths or untrusted inputs. 3. Disable or replace the use of torch.load for loading models with safer alternatives that do not perform arbitrary deserialization, such as using torch.jit.load or custom deserialization methods that validate input. 4. Monitor application logs for unusual or unexpected model loading requests or file access patterns. 5. Employ application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious payloads targeting this vulnerability. 6. Prepare for patch deployment by tracking vendor updates and applying them promptly once available. 7. Conduct security reviews and code audits of any custom modifications to the GPT-SoVITS-WebUI to identify similar unsafe deserialization patterns.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-11T14:33:57.799Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6876be14a83201eaacd0bcd8

Added to database: 7/15/2025, 8:46:12 PM

Last enriched: 7/23/2025, 1:47:02 AM

Last updated: 8/16/2025, 3:30:25 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats