Skip to main content

CVE-2025-49839: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS

High
VulnerabilityCVE-2025-49839cvecve-2025-49839cwe-502
Published: Tue Jul 15 2025 (07/15/2025, 20:40:18 UTC)
Source: CVE Database V5
Vendor/Project: RVC-Boss
Product: GPT-SoVITS

Description

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-11T14:33:57.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6876be14a83201eaacd0bce6

Added to database: 7/15/2025, 8:46:12 PM

Last updated: 7/15/2025, 8:46:12 PM

Views: 1

Actions

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats