CVE-2025-49834
📋 TL;DR
This CVE describes a command injection vulnerability in GPT-SoVITS-WebUI that allows attackers to execute arbitrary commands on the server by manipulating directory parameters. The vulnerability affects all deployments running versions 20250228v3 and earlier. Attackers can gain full control of affected systems through this flaw.
💻 Affected Systems
- GPT-SoVITS-WebUI
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to other systems, and maintain persistent access.
Likely Case
Remote code execution leading to data theft, cryptocurrency mining, or system disruption.
If Mitigated
Limited impact if proper network segmentation, least privilege, and input validation are implemented.
🎯 Exploit Status
Exploitation requires web interface access but no authentication. GitHub advisory includes technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None available
Vendor Advisory: https://securitylab.github.com/advisories/GHSL-2025-045_GHSL-2025-048_RVC-Boss_GPT-SoVITS/
Restart Required: Yes
Instructions:
No official patch available. Monitor GitHub repository for updates and apply immediately when released.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd input validation to reject or sanitize directory parameters containing shell metacharacters
Modify webui.py to validate denoise_inp_dir and denoise_opt_dir parameters
Network Access Restriction
linuxRestrict web interface access to trusted networks only
iptables -A INPUT -p tcp --dport [WEBUI_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [WEBUI_PORT] -j DROP
🧯 If You Can't Patch
- Immediately take affected systems offline or disable the web interface
- Implement strict network segmentation and firewall rules to limit access to trusted IPs only
🔍 How to Verify
Check if Vulnerable:
Check if running GPT-SoVITS-WebUI version 20250228v3 or earlier and if webui.py contains vulnerable open_denoise function
Check Version:
Check version in application interface or repository configuration files
Verify Fix Applied:
Verify that denoise_inp_dir and denoise_opt_dir parameters are properly validated and not passed directly to shell commands
📡 Detection & Monitoring
Log Indicators:
- Unusual shell commands in system logs
- Process execution from webui.py with suspicious arguments
- Failed command execution attempts
Network Indicators:
- Unexpected outbound connections from web server
- Command and control traffic patterns
SIEM Query:
source="webui.log" AND ("denoise_inp_dir" OR "denoise_opt_dir") AND command="*"
🔗 References
- https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L1038
- https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L362
- https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L366
- https://github.com/RVC-Boss/GPT-SoVITS/blob/165882d64f474b3563fa91adc1a679436ae9c3b8/webui.py#L909-L910
- https://securitylab.github.com/advisories/GHSL-2025-045_GHSL-2025-048_RVC-Boss_GPT-SoVITS/