Skip to main content

CVE-2025-49841: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS

High
VulnerabilityCVE-2025-49841cvecve-2025-49841cwe-502
Published: Tue Jul 15 2025 (07/15/2025, 20:43:02 UTC)
Source: CVE Database V5
Vendor/Project: RVC-Boss
Product: GPT-SoVITS

Description

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.

AI-Powered Analysis

AILast updated: 07/15/2025, 21:16:07 UTC

Technical Analysis

CVE-2025-49841 is a high-severity vulnerability affecting GPT-SoVITS-WebUI, a voice conversion and text-to-speech web user interface developed by RVC-Boss. The vulnerability arises from unsafe deserialization of untrusted data in the process_ckpt.py module, specifically within the load_sovits_new function. The variable SoVITS_dropdown accepts user input, which is then passed as sovits_path to torch.load for loading machine learning models. Since torch.load deserializes data, if an attacker controls the input, they can craft malicious serialized objects that execute arbitrary code during deserialization. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a common and dangerous flaw that can lead to remote code execution without requiring authentication or user interaction. The affected versions are all releases up to and including 20250228v3. At the time of publication, no patches or mitigations have been released, and no known exploits are currently observed in the wild. The CVSS 4.0 base score is 8.9, reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. This vulnerability allows an attacker to fully compromise the system running GPT-SoVITS-WebUI by remotely executing arbitrary code, potentially leading to data theft, service disruption, or pivoting within the network.

Potential Impact

For European organizations utilizing GPT-SoVITS-WebUI, particularly those in research, media production, or AI development sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive voice data, intellectual property, or internal systems. Given the high impact on confidentiality, integrity, and availability, attackers could manipulate voice conversion outputs, disrupt services, or use compromised systems as footholds for broader network attacks. The lack of authentication or user interaction requirements means that exposed instances are highly vulnerable to automated exploitation. This could affect cloud-hosted deployments or on-premises installations, potentially impacting compliance with GDPR and other data protection regulations due to unauthorized data access or breaches. The absence of patches increases the window of exposure, necessitating immediate risk management measures.

Mitigation Recommendations

Since no official patches are available, European organizations should implement the following specific mitigations: 1) Restrict network exposure of GPT-SoVITS-WebUI instances by placing them behind firewalls or VPNs to limit access to trusted users only. 2) Employ strict input validation and sanitization on the SoVITS_dropdown input to prevent malicious serialized data from being processed. 3) If feasible, disable or replace the use of torch.load for loading user-supplied models with safer alternatives that do not perform deserialization, or implement custom deserialization routines with strict type whitelisting. 4) Monitor logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected model load requests or anomalous system behavior. 5) Conduct regular security audits and consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 6) Engage with the vendor or open-source community to track patch releases and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-11T14:33:57.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6876c198a83201eaacd0caae

Added to database: 7/15/2025, 9:01:12 PM

Last enriched: 7/15/2025, 9:16:07 PM

Last updated: 7/15/2025, 10:16:13 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats