CVE-2025-49839

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rvc-boss:gpt-sovits-webui:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-07-15 21:15

Updated : 2025-07-30 20:13


NVD link : CVE-2025-49839

Mitre link : CVE-2025-49839

CVE.ORG link : CVE-2025-49839


JSON object : View

Products Affected

rvc-boss

  • gpt-sovits-webui
CWE
CWE-502

Deserialization of Untrusted Data