PT-2026-8332 · Pretix · Pretix
Published
2026-02-16
·
Updated
2026-03-13
·
CVE-2026-2451
CVSS v4.0
7.5
High
| AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/RE:L/U:Red |
Name of the Vulnerable Software and Affected Versions
pretix (affected versions not specified)
Description
The software allows the use of placeholders in email templates that are populated with customer data. A flaw exists where specially crafted placeholder names, such as
{{event. init . code .co filename}}, can be used to extract information from the pretix system. An attacker who can control email templates, typically any user of the pretix backend, could potentially retrieve sensitive information from the system configuration, including database passwords and API keys. Existing preventative mechanisms within pretix were not fully effective in this instance.Recommendations
Rotate all passwords and API keys contained in your pretix.cfg file.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Pretix