We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49839

GHSL-2025-051: GPT-SoVITS Deserialization of Untrusted Data vulnerability



Description

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.

Reserved 2025-06-11 | Published 2025-07-15 | Updated 2025-07-15 | Assigner GitHub_M


HIGH: 8.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

<= 20250228v3
affected

References

securitylab.github.com/...GHSL-2025-053_RVC-Boss_GPT-SoVITS/

github.com/...a91adc1a679436ae9c3b8/tools/uvr5/bsroformer.py

github.com/...3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py

github.com/...3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py

github.com/...3563fa91adc1a679436ae9c3b8/tools/uvr5/webui.py

cve.org (CVE-2025-49839)

nvd.nist.gov (CVE-2025-49839)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49839

Support options

Helpdesk Chat, Email, Knowledgebase