Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2451: CWE-627 Dynamic Variable Evaluation in pretix pretix-doistep

0
High
VulnerabilityCVE-2026-2451cvecve-2026-2451cwe-627
Published: Mon Feb 16 2026 (02/16/2026, 10:16:05 UTC)
Source: CVE Database V5
Vendor/Project: pretix
Product: pretix-doistep

Description

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}. This way, an attacker with the ability to control email templates (usually every user of the pretix backend) could retrieve sensitive information from the system configuration, including even database passwords or API keys. pretix does include mechanisms to prevent the usage of such malicious placeholders, however due to a mistake in the code, they were not fully effective for this plugin. Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 00:01:53 UTC

Technical Analysis

CVE-2026-2451 is a vulnerability classified under CWE-627 (Dynamic Variable Evaluation) affecting the pretix-doistep plugin of the pretix ticketing system, version 1.0.0. The issue stems from the way pretix processes placeholders in email templates, which are dynamically replaced with customer data during email generation. Normally, placeholders like {name} are replaced with the buyer's name. However, due to insufficient sanitization and filtering of placeholder inputs in the pretix-doistep plugin, an attacker with the ability to modify email templates—typically any user with backend access—can inject specially crafted placeholders such as {{event.__init__.__code__.co_filename}}. This exploits Python's introspection capabilities to access internal object attributes and retrieve sensitive information from the system, including configuration files, database passwords, and API keys. Although pretix implements some mechanisms to block malicious placeholders, a coding mistake in this plugin bypasses these protections, enabling information disclosure. The vulnerability does not require user interaction but does require low-level privileges (backend user access). The CVSS 4.0 score of 7.5 reflects a high severity due to the potential for significant confidentiality impact and the complexity of exploitation being moderate (high attack complexity). No public exploits have been reported yet. The vendor recommends immediate rotation of all credentials stored in pretix.cfg to mitigate potential compromise. No patches are currently linked, so organizations must rely on access control and credential management until fixes are available.

Potential Impact

The primary impact of CVE-2026-2451 is the unauthorized disclosure of sensitive information from the pretix system, including database passwords and API keys. This can lead to further compromise of backend systems, unauthorized data access, and potential lateral movement within the affected environment. Organizations using pretix for event ticketing and management could face data breaches involving customer information and internal configuration secrets. The vulnerability undermines confidentiality and could indirectly affect integrity and availability if attackers leverage stolen credentials to manipulate or disrupt services. Since exploitation requires backend user privileges, insider threats or compromised user accounts pose significant risks. The absence of user interaction lowers the barrier for exploitation once access is gained. The potential for credential exfiltration makes this a critical concern for organizations relying on pretix for secure event management, especially those handling sensitive customer data or payment information.

Mitigation Recommendations

1. Immediately restrict email template editing permissions to only the most trusted and necessary backend users to reduce the risk of malicious placeholder injection. 2. Conduct a thorough audit of all existing email templates to identify and remove any suspicious or non-standard placeholders that could exploit this vulnerability. 3. Rotate all passwords, API keys, and other sensitive credentials stored in the pretix.cfg configuration file as recommended by the vendor to mitigate potential exposure. 4. Monitor backend user activities and email template changes for unusual behavior or unauthorized modifications. 5. Implement network segmentation and strict access controls around the pretix backend to limit the impact of compromised accounts. 6. Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 7. Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious placeholder patterns in email templates. 8. Educate backend users about the risks of template manipulation and enforce strong authentication and session management to reduce insider threat risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
rami.io
Date Reserved
2026-02-13T09:57:34.221Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992f627bda29fb02f6786da

Added to database: 2/16/2026, 10:49:11 AM

Last enriched: 2/24/2026, 12:01:53 AM

Last updated: 4/3/2026, 3:58:44 PM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses