CVE-2025-49838: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPreDeEcho. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPreDeEcho class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPreDeEcho class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
AI Analysis
Technical Summary
CVE-2025-49838 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the AudioPreDeEcho class within the vr.py module. Specifically, the model_choose variable, which is user-controlled input representing a model path, is passed to the uvr function. Inside uvr, an instance of AudioPreDeEcho is created with the model_path attribute set to this user input appended with a .pth extension. The AudioPreDeEcho class then loads the model file using torch.load, a PyTorch function known to be vulnerable to unsafe deserialization if the input is not properly validated or sanitized. This unsafe deserialization can allow an attacker to execute arbitrary code remotely without any authentication or user interaction, as the CVSS vector indicates network attack vector, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability affects all versions of GPT-SoVITS-WebUI up to and including 20250228v3, and as of the publication date, no patches or mitigations have been released. The exploitability is rated as probable, though no known exploits have been observed in the wild yet. This vulnerability falls under CWE-502, which covers deserialization of untrusted data leading to remote code execution. Given the nature of the vulnerability, an attacker could craft malicious model files that, when loaded by the vulnerable application, execute arbitrary code on the host system, potentially leading to full system compromise, data theft, or service disruption.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a significant risk. The ability to execute arbitrary code remotely without authentication means attackers can infiltrate systems hosting the vulnerable software, potentially gaining access to sensitive voice data, intellectual property, or internal networks. This is particularly critical for organizations involved in media production, telecommunications, accessibility services, or any sector relying on voice synthesis and conversion technologies. The compromise could lead to data breaches, disruption of voice services, or use of the compromised systems as a foothold for lateral movement within corporate networks. Additionally, the high impact on confidentiality, integrity, and availability could result in regulatory non-compliance under GDPR if personal data is exposed or manipulated. The lack of available patches increases the urgency for organizations to implement compensating controls to mitigate risk until a fix is released.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Restrict network access to the GPT-SoVITS-WebUI service, limiting it to trusted internal users and systems only, to reduce exposure to remote attackers. 2) Implement strict input validation and sanitization on any user-supplied model paths or files before they are processed by the application, potentially by sandboxing or whitelisting allowed model files. 3) Monitor and audit logs for any unusual activity related to model loading or torch.load calls, to detect potential exploitation attempts. 4) Consider deploying the application within a hardened container or virtual machine with minimal privileges and strict resource controls to contain any potential compromise. 5) Engage with the vendor or community to track patch releases and apply updates promptly once available. 6) If feasible, temporarily disable or restrict the functionality that loads external model files until a secure version is released. 7) Educate developers and administrators about the risks of unsafe deserialization and enforce secure coding practices for handling serialized data.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-49838: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
Description
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPreDeEcho. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPreDeEcho class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPreDeEcho class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-49838 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the AudioPreDeEcho class within the vr.py module. Specifically, the model_choose variable, which is user-controlled input representing a model path, is passed to the uvr function. Inside uvr, an instance of AudioPreDeEcho is created with the model_path attribute set to this user input appended with a .pth extension. The AudioPreDeEcho class then loads the model file using torch.load, a PyTorch function known to be vulnerable to unsafe deserialization if the input is not properly validated or sanitized. This unsafe deserialization can allow an attacker to execute arbitrary code remotely without any authentication or user interaction, as the CVSS vector indicates network attack vector, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability affects all versions of GPT-SoVITS-WebUI up to and including 20250228v3, and as of the publication date, no patches or mitigations have been released. The exploitability is rated as probable, though no known exploits have been observed in the wild yet. This vulnerability falls under CWE-502, which covers deserialization of untrusted data leading to remote code execution. Given the nature of the vulnerability, an attacker could craft malicious model files that, when loaded by the vulnerable application, execute arbitrary code on the host system, potentially leading to full system compromise, data theft, or service disruption.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a significant risk. The ability to execute arbitrary code remotely without authentication means attackers can infiltrate systems hosting the vulnerable software, potentially gaining access to sensitive voice data, intellectual property, or internal networks. This is particularly critical for organizations involved in media production, telecommunications, accessibility services, or any sector relying on voice synthesis and conversion technologies. The compromise could lead to data breaches, disruption of voice services, or use of the compromised systems as a foothold for lateral movement within corporate networks. Additionally, the high impact on confidentiality, integrity, and availability could result in regulatory non-compliance under GDPR if personal data is exposed or manipulated. The lack of available patches increases the urgency for organizations to implement compensating controls to mitigate risk until a fix is released.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Restrict network access to the GPT-SoVITS-WebUI service, limiting it to trusted internal users and systems only, to reduce exposure to remote attackers. 2) Implement strict input validation and sanitization on any user-supplied model paths or files before they are processed by the application, potentially by sandboxing or whitelisting allowed model files. 3) Monitor and audit logs for any unusual activity related to model loading or torch.load calls, to detect potential exploitation attempts. 4) Consider deploying the application within a hardened container or virtual machine with minimal privileges and strict resource controls to contain any potential compromise. 5) Engage with the vendor or community to track patch releases and apply updates promptly once available. 6) If feasible, temporarily disable or restrict the functionality that loads external model files until a secure version is released. 7) Educate developers and administrators about the risks of unsafe deserialization and enforce secure coding practices for handling serialized data.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-11T14:33:57.800Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6876be14a83201eaacd0bcdf
Added to database: 7/15/2025, 8:46:12 PM
Last enriched: 7/15/2025, 9:02:22 PM
Last updated: 7/15/2025, 10:16:13 PM
Views: 2
Related Threats
CVE-2025-7673: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Zyxel VMG8825-T50K firmware
CriticalCVE-2025-7359: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in danielriera Counter live visitors for WooCommerce
HighCVE-2025-6747: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themefusion Avada (Fusion) Builder
MediumCVE-2025-6043: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal
HighCVE-2025-5845: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchop Affiliate Reviews
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.