CVE-2026-2415
Information Disclosure via Improper Placeholder Handling in pretix Emails
Publication date: 2026-02-16
Last updated on: 2026-03-13
Assigner: rami.io
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pretix | pretix | From 4.16.0 (inc) to 2026.1.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-627 | In a language where the user can influence the name of a variable at runtime, if the variable names are not controlled, an attacker can read or write to arbitrary variables, or access arbitrary functions. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
Can you explain this vulnerability to me?
This vulnerability involves the email templating system in pretix, where placeholders in emails are replaced with customer data. Two security-relevant bugs were found:
- An attacker controlling email templates (usually any pretix backend user) could use specially crafted placeholder names to exfiltrate sensitive system information, such as database passwords or API keys.
- Placeholders in email subjects and plain text bodies were evaluated twice, allowing a ticket buyer to exploit the first issue by injecting placeholders that get rendered in the second evaluation. This broadens the attack surface and could theoretically leak order information to attendees.
Although pretix has mechanisms to prevent malicious placeholders, these were not fully effective for email subjects, and the buyer-controlled placeholder that could be exploited is rare in email subjects.
How can this vulnerability impact me? :
This vulnerability can lead to the leakage of sensitive information from the pretix system, including database passwords and API keys, if an attacker can control email templates.
It also increases the risk that order information could be leaked to unintended recipients, such as other attendees, although this scenario is considered unlikely.
Due to these risks, it is recommended to rotate all passwords and API keys contained in the pretix configuration file as a precaution.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, it is recommended to rotate all passwords and API keys contained in your pretix.cfg configuration file.
This precaution helps to prevent potential exfiltration of sensitive information such as database passwords or API keys that could have been exposed due to the vulnerability.