Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21559 | GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available. |
Wed, 30 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rvc-boss
Rvc-boss gpt-sovits-webui |
|
| CPEs | cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rvc-boss
Rvc-boss gpt-sovits-webui |
|
| Metrics |
cvssV3_1
|
Wed, 16 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Tue, 15 Jul 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available. | |
| Title | GHSL-2025-051: GPT-SoVITS Deserialization of Untrusted Data vulnerability | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-16T13:40:13.900Z
Reserved: 2025-06-11T14:33:57.800Z
Link: CVE-2025-49839
Updated: 2025-07-16T13:40:09.800Z
Status : Analyzed
Published: 2025-07-15T21:15:32.737
Modified: 2025-07-30T20:13:19.070
Link: CVE-2025-49839
No data.
OpenCVE Enrichment
No data.
EUVD