Impact
Emails in pretix use placeholders that can be populated with user data. The bug allows attackers who can create or edit email templates to place arbitrary Python attributes, causing the system to expose sensitive configuration details such as database credentials and API keys. This results in full disclosure of critical secrets stored in the pretix.cfg file.
Affected Systems
pretix’s newsletter component (pretix-newsletter) is affected. All versions of the pretix platform that include the newsletter plugin before the 2026.1.1 release are vulnerable. The vulnerability is present in versions such as 2.0.0 and earlier, and any instance where the newsletter plugin is enabled.
Risk and Exploitability
The CVSS score of 7.5 indicates high risk, yet the EPSS score is below 1%, suggesting the chance of exploitation is currently low. The flaw is not listed in the CISA KEV catalog, meaning there is no confirmed public exploitation. Attackers would need access to the backend to alter templates, thus the risk is greatest for instances with lax administrative controls. If the vulnerability is exploited, attackers could read the entire pretix.cfg file, leading to credential compromise and potentially full system takeover.
OpenCVE Enrichment