Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2452: CWE-627 Dynamic Variable Evaluation in pretix pretix-newsletter

0
High
VulnerabilityCVE-2026-2452cvecve-2026-2452cwe-627
Published: Mon Feb 16 2026 (02/16/2026, 10:16:22 UTC)
Source: CVE Database V5
Vendor/Project: pretix
Product: pretix-newsletter

Description

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}. This way, an attacker with the ability to control email templates (usually every user of the pretix backend) could retrieve sensitive information from the system configuration, including even database passwords or API keys. pretix does include mechanisms to prevent the usage of such malicious placeholders, however due to a mistake in the code, they were not fully effective for this plugin. Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/  file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 00:02:14 UTC

Technical Analysis

CVE-2026-2452 is a vulnerability classified under CWE-627 (Dynamic Variable Evaluation) affecting the pretix-newsletter plugin versions 1.0.0 and 2.0.0. Pretix uses a templating mechanism for emails where placeholders like {name} are replaced with customer data. However, this mechanism improperly sanitizes placeholder inputs, allowing attackers with backend user privileges to inject specially crafted placeholders such as {{event.__init__.__code__.co_filename}}. This exploits Python's dynamic attribute access to traverse internal object properties and retrieve sensitive information from the system, including configuration files, database credentials, and API keys. Although pretix implements some filtering to block malicious placeholders, a coding error in the pretix-newsletter plugin bypasses these protections. The vulnerability requires authenticated access to the pretix backend but does not require additional user interaction. The CVSS 4.0 vector indicates network attack vector, high complexity, no user interaction, and partial privileges required, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for sensitive data exfiltration is significant. The vendor recommends rotating all secrets in the pretix.cfg configuration file as a precaution. This vulnerability highlights risks inherent in dynamic template evaluation without strict input validation and sandboxing.

Potential Impact

The primary impact of CVE-2026-2452 is the unauthorized disclosure of sensitive system information, including database passwords and API keys, which can lead to full system compromise. Attackers with backend user access can leverage this flaw to escalate privileges, access confidential customer data, manipulate event configurations, or disrupt service availability. The exposure of API keys and database credentials could allow lateral movement within the organization's infrastructure or enable further attacks such as data exfiltration, ransomware deployment, or supply chain compromise. Since pretix is used globally for event ticketing and management, organizations relying on it for customer communications and sales are at risk of reputational damage, regulatory penalties, and operational disruption. The vulnerability's requirement for authenticated access limits exposure to insider threats or compromised accounts but does not eliminate risk, especially in environments with multiple backend users or weak access controls. The lack of known public exploits reduces immediate risk but does not preclude future exploitation. Overall, the vulnerability poses a high risk to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

1. Immediately rotate all passwords, API keys, and other secrets stored in the pretix.cfg configuration file to invalidate any potentially compromised credentials. 2. Restrict backend user privileges to the minimum necessary, limiting who can edit email templates or access sensitive configuration areas. 3. Apply any available patches or updates from the pretix project addressing this vulnerability as soon as they are released. 4. Implement strict input validation and sanitization on email template placeholders to prevent dynamic evaluation of arbitrary expressions. 5. Consider disabling or restricting the use of dynamic placeholders in email templates until a secure fix is confirmed. 6. Monitor backend user activities and audit changes to email templates for suspicious or unauthorized modifications. 7. Employ network segmentation and access controls to limit backend access to trusted users and systems. 8. Regularly review and update security policies around credential management and backend access. 9. If possible, deploy runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious placeholder patterns. 10. Educate administrators and backend users about the risks of template injection and secure template management practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
rami.io
Date Reserved
2026-02-13T09:57:35.371Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992f627bda29fb02f6786dd

Added to database: 2/16/2026, 10:49:11 AM

Last enriched: 2/24/2026, 12:02:14 AM

Last updated: 4/3/2026, 11:20:38 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses