GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 30 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Rvc-boss Rvc-boss gpt-sovits-webui | |
| CPEs | cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:* | |
| Vendors & Products | Rvc-boss Rvc-boss gpt-sovits-webui | |
| Metrics | cvssV3_1 
 | 
Wed, 16 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | 
Tue, 15 Jul 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available. | |
| Title | GHSL-2025-051: GPT-SoVITS Deserialization of Untrusted Data vulnerability | |
| Weaknesses | CWE-502 | |
| References |  | 
 | 
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-15T20:40:18.251Z
Updated: 2025-07-16T13:40:13.900Z
Reserved: 2025-06-11T14:33:57.800Z
Link: CVE-2025-49839
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-16T13:40:09.800Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-07-15T21:15:32.737
Modified: 2025-07-30T20:13:19.070
Link: CVE-2025-49839
 Redhat
                        Redhat
                    No data.