CVE-2025-49841: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.
AI Analysis
Technical Summary
CVE-2025-49841 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the process_ckpt.py module, specifically in the load_sovits_new function. The variable SoVITS_dropdown accepts user input, which is then passed as sovits_path to torch.load without proper validation or sanitization. Torch.load is known to deserialize data, and if the input is maliciously crafted, it can lead to arbitrary code execution or other malicious behavior. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a critical security flaw because deserialization processes often allow attackers to execute arbitrary code if they can control the input. The affected versions include all releases up to and including 20250228v3. At the time of publication, no patches or mitigations have been officially released. The CVSS 4.0 score is 8.9, indicating a high severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild, but the ease of exploitation and the critical nature of the flaw make it a significant risk for users of GPT-SoVITS-WebUI.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a serious risk. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services. Organizations relying on voice conversion or text-to-speech services for customer interaction, accessibility, or internal communications could face operational disruptions or reputational damage. Given the high impact on confidentiality, integrity, and availability, sensitive data processed or stored by these systems could be exposed or manipulated. Additionally, since the vulnerability requires no authentication or user interaction, attackers can exploit it remotely and without user awareness, increasing the risk of widespread attacks. The lack of patches further exacerbates the threat, leaving organizations exposed until mitigations or updates are available.
Mitigation Recommendations
1. Immediate mitigation should include isolating GPT-SoVITS-WebUI instances from public networks to reduce exposure. 2. Implement strict input validation and sanitization on the SoVITS_dropdown input to prevent malicious payloads from being processed. 3. Employ application-layer firewalls or intrusion detection/prevention systems to monitor and block suspicious deserialization attempts targeting torch.load. 4. Consider disabling or restricting the use of torch.load for loading models from untrusted sources until a patch is available. 5. Monitor vendor communications and security advisories closely for updates or patches addressing this vulnerability. 6. As a longer-term solution, refactor the codebase to replace unsafe deserialization with safer alternatives, such as using secure serialization libraries or verifying the integrity and authenticity of model files before loading. 7. Conduct regular security audits and penetration testing focusing on deserialization vulnerabilities in machine learning model loading components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-49841: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
Description
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-49841 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the process_ckpt.py module, specifically in the load_sovits_new function. The variable SoVITS_dropdown accepts user input, which is then passed as sovits_path to torch.load without proper validation or sanitization. Torch.load is known to deserialize data, and if the input is maliciously crafted, it can lead to arbitrary code execution or other malicious behavior. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), which is a critical security flaw because deserialization processes often allow attackers to execute arbitrary code if they can control the input. The affected versions include all releases up to and including 20250228v3. At the time of publication, no patches or mitigations have been officially released. The CVSS 4.0 score is 8.9, indicating a high severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild, but the ease of exploitation and the critical nature of the flaw make it a significant risk for users of GPT-SoVITS-WebUI.
Potential Impact
For European organizations using GPT-SoVITS-WebUI, this vulnerability poses a serious risk. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services. Organizations relying on voice conversion or text-to-speech services for customer interaction, accessibility, or internal communications could face operational disruptions or reputational damage. Given the high impact on confidentiality, integrity, and availability, sensitive data processed or stored by these systems could be exposed or manipulated. Additionally, since the vulnerability requires no authentication or user interaction, attackers can exploit it remotely and without user awareness, increasing the risk of widespread attacks. The lack of patches further exacerbates the threat, leaving organizations exposed until mitigations or updates are available.
Mitigation Recommendations
1. Immediate mitigation should include isolating GPT-SoVITS-WebUI instances from public networks to reduce exposure. 2. Implement strict input validation and sanitization on the SoVITS_dropdown input to prevent malicious payloads from being processed. 3. Employ application-layer firewalls or intrusion detection/prevention systems to monitor and block suspicious deserialization attempts targeting torch.load. 4. Consider disabling or restricting the use of torch.load for loading models from untrusted sources until a patch is available. 5. Monitor vendor communications and security advisories closely for updates or patches addressing this vulnerability. 6. As a longer-term solution, refactor the codebase to replace unsafe deserialization with safer alternatives, such as using secure serialization libraries or verifying the integrity and authenticity of model files before loading. 7. Conduct regular security audits and penetration testing focusing on deserialization vulnerabilities in machine learning model loading components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-11T14:33:57.800Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6876c198a83201eaacd0caae
Added to database: 7/15/2025, 9:01:12 PM
Last enriched: 7/23/2025, 1:31:36 AM
Last updated: 8/26/2025, 2:37:58 PM
Views: 41
Related Threats
CVE-2025-9695: Improper Export of Android Application Components in GalleryVault Gallery Vault App
MediumCVE-2025-9694: SQL Injection in Campcodes Advanced Online Voting System
MediumCVE-2025-9692: SQL Injection in Campcodes Online Shopping System
MediumCVE-2025-9691: SQL Injection in Campcodes Online Shopping System
MediumCVE-2025-9690: SQL Injection in SourceCodester Advanced School Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.