CVE-2026-2452: CWE-627 Dynamic Variable Evaluation in pretix pretix-newsletter
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}. This way, an attacker with the ability to control email templates (usually every user of the pretix backend) could retrieve sensitive information from the system configuration, including even database passwords or API keys. pretix does include mechanisms to prevent the usage of such malicious placeholders, however due to a mistake in the code, they were not fully effective for this plugin. Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/ file.
AI Analysis
Technical Summary
CVE-2026-2452 is a vulnerability classified under CWE-627 (Dynamic Variable Evaluation) affecting the pretix-newsletter plugin versions 1.0.0 and 2.0.0. Pretix uses placeholders in email templates to dynamically insert customer data, such as {name}, which are replaced with actual values at runtime. However, the placeholder processing mechanism contained a critical flaw: it allowed specially crafted placeholders that access internal Python object attributes, for example, {{event.__init__.__code__.co_filename}}. This enables an attacker with the ability to edit email templates—typically any user with backend access—to execute dynamic evaluation and retrieve sensitive information from the system, including database passwords and API keys stored in the pretix.cfg configuration file. Although pretix implements some filtering to block malicious placeholders, a coding error in the pretix-newsletter plugin rendered these protections ineffective. The vulnerability has a CVSS 4.0 base score of 7.5, indicating high severity, with network attack vector, high impact on confidentiality, integrity, and availability, and requiring low privileges but no user interaction. No public exploits are currently known, but the risk of credential leakage and system compromise is significant. The vulnerability was published on 2026-02-16, and no patches are currently linked, so immediate mitigation and credential rotation are advised.
Potential Impact
For European organizations using pretix for event ticketing and newsletter distribution, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive system credentials. An attacker with backend access could exfiltrate database passwords and API keys, potentially leading to full system compromise, unauthorized data access, and disruption of event management operations. This could result in data breaches involving personal customer information, financial loss, reputational damage, and regulatory penalties under GDPR. The ability to exploit this vulnerability remotely over the network without user interaction increases the attack surface. Organizations relying on pretix for critical event infrastructure or handling large volumes of personal data are particularly vulnerable. The lack of known exploits in the wild suggests limited current exploitation but also highlights the importance of proactive mitigation to prevent future attacks.
Mitigation Recommendations
1. Immediately restrict email template editing permissions to only the most trusted and necessary backend users to reduce the risk of malicious template injection. 2. Monitor and audit all changes to email templates for suspicious placeholder usage, especially those containing double curly braces and Python object attribute access patterns. 3. Rotate all database passwords, API keys, and other sensitive credentials stored in the pretix.cfg configuration file to invalidate any potentially compromised secrets. 4. Apply patches or updates from pretix as soon as they become available that address this vulnerability. 5. Consider implementing additional input validation or sandboxing mechanisms for template rendering to prevent dynamic code evaluation. 6. Conduct a thorough security review of the pretix environment, including access controls and logging, to detect any unauthorized access or exploitation attempts. 7. Educate backend users about the risks of template manipulation and enforce strong authentication and session management controls.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium, Austria, Switzerland
CVE-2026-2452: CWE-627 Dynamic Variable Evaluation in pretix pretix-newsletter
Description
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}. This way, an attacker with the ability to control email templates (usually every user of the pretix backend) could retrieve sensitive information from the system configuration, including even database passwords or API keys. pretix does include mechanisms to prevent the usage of such malicious placeholders, however due to a mistake in the code, they were not fully effective for this plugin. Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/ file.
AI-Powered Analysis
Technical Analysis
CVE-2026-2452 is a vulnerability classified under CWE-627 (Dynamic Variable Evaluation) affecting the pretix-newsletter plugin versions 1.0.0 and 2.0.0. Pretix uses placeholders in email templates to dynamically insert customer data, such as {name}, which are replaced with actual values at runtime. However, the placeholder processing mechanism contained a critical flaw: it allowed specially crafted placeholders that access internal Python object attributes, for example, {{event.__init__.__code__.co_filename}}. This enables an attacker with the ability to edit email templates—typically any user with backend access—to execute dynamic evaluation and retrieve sensitive information from the system, including database passwords and API keys stored in the pretix.cfg configuration file. Although pretix implements some filtering to block malicious placeholders, a coding error in the pretix-newsletter plugin rendered these protections ineffective. The vulnerability has a CVSS 4.0 base score of 7.5, indicating high severity, with network attack vector, high impact on confidentiality, integrity, and availability, and requiring low privileges but no user interaction. No public exploits are currently known, but the risk of credential leakage and system compromise is significant. The vulnerability was published on 2026-02-16, and no patches are currently linked, so immediate mitigation and credential rotation are advised.
Potential Impact
For European organizations using pretix for event ticketing and newsletter distribution, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive system credentials. An attacker with backend access could exfiltrate database passwords and API keys, potentially leading to full system compromise, unauthorized data access, and disruption of event management operations. This could result in data breaches involving personal customer information, financial loss, reputational damage, and regulatory penalties under GDPR. The ability to exploit this vulnerability remotely over the network without user interaction increases the attack surface. Organizations relying on pretix for critical event infrastructure or handling large volumes of personal data are particularly vulnerable. The lack of known exploits in the wild suggests limited current exploitation but also highlights the importance of proactive mitigation to prevent future attacks.
Mitigation Recommendations
1. Immediately restrict email template editing permissions to only the most trusted and necessary backend users to reduce the risk of malicious template injection. 2. Monitor and audit all changes to email templates for suspicious placeholder usage, especially those containing double curly braces and Python object attribute access patterns. 3. Rotate all database passwords, API keys, and other sensitive credentials stored in the pretix.cfg configuration file to invalidate any potentially compromised secrets. 4. Apply patches or updates from pretix as soon as they become available that address this vulnerability. 5. Consider implementing additional input validation or sandboxing mechanisms for template rendering to prevent dynamic code evaluation. 6. Conduct a thorough security review of the pretix environment, including access controls and logging, to detect any unauthorized access or exploitation attempts. 7. Educate backend users about the risks of template manipulation and enforce strong authentication and session management controls.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- rami.io
- Date Reserved
- 2026-02-13T09:57:35.371Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6992f627bda29fb02f6786dd
Added to database: 2/16/2026, 10:49:11 AM
Last enriched: 2/16/2026, 11:03:35 AM
Last updated: 2/17/2026, 3:54:30 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2617: Insecure Default Initialization of Resource in Beetel 777VR1
MediumCVE-2025-70830: n/a
UnknownCVE-2025-70828: n/a
UnknownCVE-2026-2616: Hard-coded Credentials in Beetel 777VR1
HighCVE-2025-70829: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.