Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-2452

Emails sent by pretix can utilize placeholders that will be filled with customer data.
Back to all
CVE

CVE-2026-2452

Emails sent by pretix can utilize placeholders that will be filled with customer data.

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name}

 is used in an email template, it will  be replaced with the buyer's 

name for the final email. This mechanism contained a security-relevant bug:

It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.init.code.co_filename}}.

 This way, an attacker with the ability to control email templates 

(usually every user of the pretix backend) could retrieve sensitive 

information from the system configuration, including even database 

passwords or API keys. pretix does include mechanisms to prevent the usage of such 

malicious placeholders, however due to a mistake in the code, they were 

not fully effective for this plugin.

Out of caution, we recommend that you rotate all passwords and API keys contained in your  pretix.cfg https://docs.pretix.eu/self-hosting/config/  file.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
7.5
-
4.0
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:Red
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
C
H
U
-

Related Resources

No items found.

References

https://pretix.eu/about/en/blog/20260216-release-2026-1-1/

Severity

6.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
6.5
EPSS Probability
0.00048%
EPSS Percentile
0.15006%
Introduced Version
065e6d402402bbc847dd3cb01b0700f88352886e
Fix Available
0818ea6b45b5df2f657b57d2195b700c2f67a158

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading