CVE-2025-49839: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
AI Analysis
Technical Summary
CVE-2025-49839 is a high-severity vulnerability classified under CWE-502, which involves unsafe deserialization of untrusted data within the GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The affected versions are those up to and including 20250228v3. The vulnerability arises in the bsroformer.py component, where the variable model_choose accepts user input, typically a path to a model file. This input is passed to the uvr function, which instantiates the Roformer_Loader class with the model_path attribute set to the user-supplied input appended with a .ckpt extension. The Roformer_Loader then loads the model file using torch.load, a PyTorch function known to perform deserialization. Because torch.load can deserialize arbitrary Python objects, if an attacker supplies a maliciously crafted model file or path, they can trigger unsafe deserialization, potentially leading to remote code execution or other malicious actions. At the time of publication, no patches or mitigations have been released, and no known exploits are currently observed in the wild. The CVSS 4.0 score is 8.9, reflecting a high severity due to the vulnerability’s network accessibility, lack of required privileges or user interaction, and its potential to fully compromise confidentiality, integrity, and availability of the affected system.
Potential Impact
For European organizations utilizing GPT-SoVITS-WebUI, particularly in sectors leveraging voice conversion or text-to-speech technologies such as media, telecommunications, or accessibility services, this vulnerability poses a significant risk. Exploitation could allow attackers to execute arbitrary code remotely without authentication, leading to full system compromise. This could result in unauthorized access to sensitive data, manipulation or disruption of voice services, and potential lateral movement within networks. Given the nature of the software, organizations relying on it for customer-facing or internal communication tools may face service outages or data breaches. Additionally, the lack of available patches increases the window of exposure. The impact is amplified in environments where the software is exposed to untrusted networks or users, such as public-facing web interfaces or multi-tenant cloud deployments.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the GPT-SoVITS-WebUI to trusted users and networks only, employing network segmentation and firewall rules to limit exposure. Administrators should disable or restrict the functionality that allows user-supplied model paths until a patch is available. Implementing input validation and sanitization on the model_choose parameter can reduce risk, although this is a temporary measure. Monitoring and logging all access to the vulnerable component is critical to detect potential exploitation attempts. Organizations should also consider running the application in a sandboxed or containerized environment with minimal privileges to contain any compromise. Finally, staying alert for vendor updates or patches and applying them promptly once released is essential. If possible, replacing torch.load with safer deserialization methods or restricting deserialization to trusted sources is recommended in future versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-49839: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
Description
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-49839 is a high-severity vulnerability classified under CWE-502, which involves unsafe deserialization of untrusted data within the GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The affected versions are those up to and including 20250228v3. The vulnerability arises in the bsroformer.py component, where the variable model_choose accepts user input, typically a path to a model file. This input is passed to the uvr function, which instantiates the Roformer_Loader class with the model_path attribute set to the user-supplied input appended with a .ckpt extension. The Roformer_Loader then loads the model file using torch.load, a PyTorch function known to perform deserialization. Because torch.load can deserialize arbitrary Python objects, if an attacker supplies a maliciously crafted model file or path, they can trigger unsafe deserialization, potentially leading to remote code execution or other malicious actions. At the time of publication, no patches or mitigations have been released, and no known exploits are currently observed in the wild. The CVSS 4.0 score is 8.9, reflecting a high severity due to the vulnerability’s network accessibility, lack of required privileges or user interaction, and its potential to fully compromise confidentiality, integrity, and availability of the affected system.
Potential Impact
For European organizations utilizing GPT-SoVITS-WebUI, particularly in sectors leveraging voice conversion or text-to-speech technologies such as media, telecommunications, or accessibility services, this vulnerability poses a significant risk. Exploitation could allow attackers to execute arbitrary code remotely without authentication, leading to full system compromise. This could result in unauthorized access to sensitive data, manipulation or disruption of voice services, and potential lateral movement within networks. Given the nature of the software, organizations relying on it for customer-facing or internal communication tools may face service outages or data breaches. Additionally, the lack of available patches increases the window of exposure. The impact is amplified in environments where the software is exposed to untrusted networks or users, such as public-facing web interfaces or multi-tenant cloud deployments.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the GPT-SoVITS-WebUI to trusted users and networks only, employing network segmentation and firewall rules to limit exposure. Administrators should disable or restrict the functionality that allows user-supplied model paths until a patch is available. Implementing input validation and sanitization on the model_choose parameter can reduce risk, although this is a temporary measure. Monitoring and logging all access to the vulnerable component is critical to detect potential exploitation attempts. Organizations should also consider running the application in a sandboxed or containerized environment with minimal privileges to contain any compromise. Finally, staying alert for vendor updates or patches and applying them promptly once released is essential. If possible, replacing torch.load with safer deserialization methods or restricting deserialization to trusted sources is recommended in future versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-11T14:33:57.800Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6876be14a83201eaacd0bce6
Added to database: 7/15/2025, 8:46:12 PM
Last enriched: 7/23/2025, 1:48:01 AM
Last updated: 8/27/2025, 9:59:39 AM
Views: 25
Related Threats
CVE-2025-9683: Cross Site Scripting in O2OA
MediumCVE-2025-9682: Cross Site Scripting in O2OA
MediumCVE-2025-9681: Cross Site Scripting in O2OA
MediumCVE-2025-9680: Cross Site Scripting in O2OA
MediumCVE-2025-9679: SQL Injection in itsourcecode Student Information System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.