CVE-2026-2452
Information Disclosure via Insecure Placeholder Handling in pretix Emails
Publication date: 2026-02-16
Last updated on: 2026-03-12
Assigner: rami.io
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pretix | pretix | From 4.16.0 (inc) to 2026.1.1 (exc) |
| pretix | newsletters | to 1.6.3 (exc) |
| pretix | newsletters | 2.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-627 | In a language where the user can influence the name of a variable at runtime, if the variable names are not controlled, an attacker can read or write to arbitrary variables, or access arbitrary functions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the pretix system's email template mechanism, which uses placeholders to insert customer data into emails. An attacker who can control email templates (usually any user of the pretix backend) can craft malicious placeholders such as {{event.__init__.__code__.co_filename}} to exfiltrate sensitive system information.
Due to a bug, the protections designed to block such malicious placeholders were not fully effective, allowing attackers to retrieve sensitive data including database passwords and API keys.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can gain unauthorized access to sensitive configuration information such as database passwords and API keys.
This can lead to further compromise of the system, including unauthorized data access, data breaches, or manipulation of the pretix system.
As a precaution, it is recommended to rotate all passwords and API keys stored in the pretix configuration file after addressing this vulnerability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, it is recommended to rotate all passwords and API keys contained in your pretix.cfg configuration file.
This is necessary because the vulnerability allows attackers with control over email templates to exfiltrate sensitive system information, including database passwords and API keys.