CVE-2025-49834

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in GPT-SoVITS-WebUI that allows attackers to execute arbitrary commands on the server by manipulating directory parameters. The vulnerability affects all deployments running versions 20250228v3 and earlier. Attackers can gain full control of affected systems through this flaw.

💻 Affected Systems

Products:
  • GPT-SoVITS-WebUI
Versions: 20250228v3 and prior
Operating Systems: All platforms running Python
Default Config Vulnerable: ⚠️ Yes
Notes: Any deployment with web interface accessible to users is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to data theft, cryptocurrency mining, or system disruption.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and input validation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires web interface access but no authentication. GitHub advisory includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://securitylab.github.com/advisories/GHSL-2025-045_GHSL-2025-048_RVC-Boss_GPT-SoVITS/

Restart Required: Yes

Instructions:

No official patch available. Monitor GitHub repository for updates and apply immediately when released.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add input validation to reject or sanitize directory parameters containing shell metacharacters

Modify webui.py to validate denoise_inp_dir and denoise_opt_dir parameters

Network Access Restriction

linux

Restrict web interface access to trusted networks only

iptables -A INPUT -p tcp --dport [WEBUI_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [WEBUI_PORT] -j DROP

🧯 If You Can't Patch

  • Immediately take affected systems offline or disable the web interface
  • Implement strict network segmentation and firewall rules to limit access to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check if running GPT-SoVITS-WebUI version 20250228v3 or earlier and if webui.py contains vulnerable open_denoise function

Check Version:

Check version in application interface or repository configuration files

Verify Fix Applied:

Verify that denoise_inp_dir and denoise_opt_dir parameters are properly validated and not passed directly to shell commands

📡 Detection & Monitoring

Log Indicators:

  • Unusual shell commands in system logs
  • Process execution from webui.py with suspicious arguments
  • Failed command execution attempts

Network Indicators:

  • Unexpected outbound connections from web server
  • Command and control traffic patterns

SIEM Query:

source="webui.log" AND ("denoise_inp_dir" OR "denoise_opt_dir") AND command="*"

🔗 References

📤 Share & Export