GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Tue, 15 Jul 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available. | |
Title | GHSL-2025-053: GPT-SoVITS Deserialization of Untrusted Data vulnerability | |
Weaknesses | CWE-502 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-15T20:43:02.861Z
Updated: 2025-07-18T14:42:18.165Z
Reserved: 2025-06-11T14:33:57.800Z
Link: CVE-2025-49841

Updated: 2025-07-18T14:42:15.336Z

Status : Awaiting Analysis
Published: 2025-07-15T21:15:32.997
Modified: 2025-07-16T14:58:59.837
Link: CVE-2025-49841

No data.