CVE-2026-2451: CWE-627 Dynamic Variable Evaluation in pretix pretix-doistep
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}. This way, an attacker with the ability to control email templates (usually every user of the pretix backend) could retrieve sensitive information from the system configuration, including even database passwords or API keys. pretix does include mechanisms to prevent the usage of such malicious placeholders, however due to a mistake in the code, they were not fully effective for this plugin. Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg file.
AI Analysis
Technical Summary
CVE-2026-2451 is a vulnerability classified under CWE-627 (Dynamic Variable Evaluation) affecting pretix-doistep, a plugin for the pretix event ticketing system, specifically version 1.0.0. Pretix allows email templates to include placeholders that dynamically insert customer data, such as {name} for the buyer's name. However, the template engine's handling of these placeholders contained a critical flaw: it permitted the use of crafted placeholders like {{event.__init__.__code__.co_filename}} that exploit Python's object model to access internal attributes and code objects. This dynamic evaluation flaw enables an attacker with backend user privileges—who can edit email templates—to exfiltrate sensitive system information, including database passwords and API keys stored in the pretix.cfg configuration file. Although pretix implements some filtering mechanisms to prevent malicious placeholders, a coding error in the pretix-doistep plugin rendered these protections ineffective. The vulnerability does not require user interaction but does require at least limited privileges to modify email templates. The CVSS 4.0 score is 7.5 (high), reflecting the network attack vector, high impact on confidentiality, integrity, and availability, and the complexity of exploitation being high but feasible with partial privileges. No public exploits are currently known. Due to the nature of the flaw, attackers can gain access to critical secrets, potentially leading to further compromise of the system or connected infrastructure.
Potential Impact
For European organizations using pretix 1.0.0 with the pretix-doistep plugin, this vulnerability poses a significant risk of sensitive data leakage. Exposure of database credentials and API keys can lead to unauthorized access to backend databases, manipulation of event data, or further lateral movement within the organization's network. This can disrupt event operations, compromise customer data privacy, and damage organizational reputation. Given the widespread use of pretix in event management across Europe, especially in countries with vibrant event industries (e.g., Germany, France, UK), the impact could be substantial. Attackers exploiting this vulnerability could also leverage stolen credentials to launch supply chain attacks or access other integrated services. The breach of confidentiality and potential integrity violations may also trigger regulatory compliance issues under GDPR, leading to legal and financial consequences.
Mitigation Recommendations
1. Immediately restrict email template editing permissions to only highly trusted administrators to reduce the risk of malicious placeholder injection. 2. Audit all existing email templates for suspicious or complex placeholders that could exploit dynamic evaluation. 3. Rotate all passwords, API keys, and other sensitive credentials stored in the pretix.cfg configuration file to invalidate any potentially compromised secrets. 4. Monitor backend user activities for unusual template modifications or access patterns. 5. Apply any available patches or updates from pretix addressing this vulnerability as soon as they are released. 6. Consider implementing additional input validation or sandboxing mechanisms for template rendering to prevent arbitrary code evaluation. 7. Educate backend users about the risks of template modifications and enforce strict change management procedures. 8. If possible, isolate the pretix backend environment to limit the blast radius of any potential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2026-2451: CWE-627 Dynamic Variable Evaluation in pretix pretix-doistep
Description
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}. This way, an attacker with the ability to control email templates (usually every user of the pretix backend) could retrieve sensitive information from the system configuration, including even database passwords or API keys. pretix does include mechanisms to prevent the usage of such malicious placeholders, however due to a mistake in the code, they were not fully effective for this plugin. Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg file.
AI-Powered Analysis
Technical Analysis
CVE-2026-2451 is a vulnerability classified under CWE-627 (Dynamic Variable Evaluation) affecting pretix-doistep, a plugin for the pretix event ticketing system, specifically version 1.0.0. Pretix allows email templates to include placeholders that dynamically insert customer data, such as {name} for the buyer's name. However, the template engine's handling of these placeholders contained a critical flaw: it permitted the use of crafted placeholders like {{event.__init__.__code__.co_filename}} that exploit Python's object model to access internal attributes and code objects. This dynamic evaluation flaw enables an attacker with backend user privileges—who can edit email templates—to exfiltrate sensitive system information, including database passwords and API keys stored in the pretix.cfg configuration file. Although pretix implements some filtering mechanisms to prevent malicious placeholders, a coding error in the pretix-doistep plugin rendered these protections ineffective. The vulnerability does not require user interaction but does require at least limited privileges to modify email templates. The CVSS 4.0 score is 7.5 (high), reflecting the network attack vector, high impact on confidentiality, integrity, and availability, and the complexity of exploitation being high but feasible with partial privileges. No public exploits are currently known. Due to the nature of the flaw, attackers can gain access to critical secrets, potentially leading to further compromise of the system or connected infrastructure.
Potential Impact
For European organizations using pretix 1.0.0 with the pretix-doistep plugin, this vulnerability poses a significant risk of sensitive data leakage. Exposure of database credentials and API keys can lead to unauthorized access to backend databases, manipulation of event data, or further lateral movement within the organization's network. This can disrupt event operations, compromise customer data privacy, and damage organizational reputation. Given the widespread use of pretix in event management across Europe, especially in countries with vibrant event industries (e.g., Germany, France, UK), the impact could be substantial. Attackers exploiting this vulnerability could also leverage stolen credentials to launch supply chain attacks or access other integrated services. The breach of confidentiality and potential integrity violations may also trigger regulatory compliance issues under GDPR, leading to legal and financial consequences.
Mitigation Recommendations
1. Immediately restrict email template editing permissions to only highly trusted administrators to reduce the risk of malicious placeholder injection. 2. Audit all existing email templates for suspicious or complex placeholders that could exploit dynamic evaluation. 3. Rotate all passwords, API keys, and other sensitive credentials stored in the pretix.cfg configuration file to invalidate any potentially compromised secrets. 4. Monitor backend user activities for unusual template modifications or access patterns. 5. Apply any available patches or updates from pretix addressing this vulnerability as soon as they are released. 6. Consider implementing additional input validation or sandboxing mechanisms for template rendering to prevent arbitrary code evaluation. 7. Educate backend users about the risks of template modifications and enforce strict change management procedures. 8. If possible, isolate the pretix backend environment to limit the blast radius of any potential compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- rami.io
- Date Reserved
- 2026-02-13T09:57:34.221Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6992f627bda29fb02f6786da
Added to database: 2/16/2026, 10:49:11 AM
Last enriched: 2/16/2026, 11:03:49 AM
Last updated: 2/17/2026, 10:43:32 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25903: CWE-862 Missing Authorization in Apache Software Foundation Apache NiFi
HighCVE-2026-1216: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rebelcode RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging
HighCVE-2026-2032: Vulnerability in Mozilla Firefox for iOS
HighCVE-2026-2447: Vulnerability in Mozilla Firefox
HighCVE-2025-65717: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.