We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49841

GHSL-2025-053: GPT-SoVITS Deserialization of Untrusted Data vulnerability



Description

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.

Reserved 2025-06-11 | Published 2025-07-15 | Updated 2025-07-15 | Assigner GitHub_M


HIGH: 8.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

<= 20250228v3
affected

References

securitylab.github.com/...GHSL-2025-053_RVC-Boss_GPT-SoVITS/

github.com/...c1a679436ae9c3b8/GPT_SoVITS/inference_webui.py

github.com/...c1a679436ae9c3b8/GPT_SoVITS/inference_webui.py

github.com/...1adc1a679436ae9c3b8/GPT_SoVITS/process_ckpt.py

cve.org (CVE-2025-49841)

nvd.nist.gov (CVE-2025-49841)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49841

Support options

Helpdesk Chat, Email, Knowledgebase