GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in inference_webui.py. The GPT_dropdown variable takes user input and passes it to the change_gpt_weights function. In change_gpt_weights, the user input, here gpt_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 30 Jul 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Rvc-boss Rvc-boss gpt-sovits-webui | |
| CPEs | cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:* | |
| Vendors & Products | Rvc-boss Rvc-boss gpt-sovits-webui | |
| Metrics | cvssV3_1 
 | 
Wed, 16 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | 
Tue, 15 Jul 2025 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in inference_webui.py. The GPT_dropdown variable takes user input and passes it to the change_gpt_weights function. In change_gpt_weights, the user input, here gpt_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available. | |
| Title | GHSL-2025-052: GPT-SoVITS Deserialization of Untrusted Data vulnerability | |
| Weaknesses | CWE-502 | |
| References |  | 
 | 
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-15T20:42:09.931Z
Updated: 2025-07-16T16:22:55.467Z
Reserved: 2025-06-11T14:33:57.800Z
Link: CVE-2025-49840
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-16T16:22:50.464Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-07-15T21:15:32.870
Modified: 2025-07-30T20:15:19.033
Link: CVE-2025-49840
 Redhat
                        Redhat
                    No data.