Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21549 | GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in the webui.py open_slice function. slice_opt_root and slice-inp-path takes user input, which is passed to the open_slice function, which concatenates the user input into a command and runs it on the server, leading to arbitrary command execution. At time of publication, no known patched versions are available. |
Wed, 30 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rvc-boss
Rvc-boss gpt-sovits-webui |
|
| CPEs | cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rvc-boss
Rvc-boss gpt-sovits-webui |
|
| Metrics |
cvssV3_1
|
Wed, 16 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Tue, 15 Jul 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in the webui.py open_slice function. slice_opt_root and slice-inp-path takes user input, which is passed to the open_slice function, which concatenates the user input into a command and runs it on the server, leading to arbitrary command execution. At time of publication, no known patched versions are available. | |
| Title | GHSL-2025-045: GPT-SoVITS Command Injection vulnerability | |
| Weaknesses | CWE-77 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-16T14:02:23.577Z
Reserved: 2025-06-11T14:33:57.799Z
Link: CVE-2025-49833
Updated: 2025-07-16T14:02:20.528Z
Status : Analyzed
Published: 2025-07-15T21:15:31.930
Modified: 2025-07-30T20:11:57.790
Link: CVE-2025-49833
No data.
OpenCVE Enrichment
No data.
EUVD