Dynamic Variable Evaluation Affecting pretix package, versions [,2025.9.4)[2025.10.0,2025.10.2)[2026.1.0,2026.1.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-PRETIX-15285665
  • published16 Feb 2026
  • disclosed16 Feb 2026
  • creditUnknown

Introduced: 16 Feb 2026

CVE-2026-2415  (opens in a new tab)
CWE-627  (opens in a new tab)

How to fix?

Upgrade pretix to version 2025.9.4, 2025.10.2, 2026.1.1 or higher.

Overview

pretix is a Reinventing presales, one ticket at a time

Affected versions of this package are vulnerable to Dynamic Variable Evaluation via the evaluation of placeholders in email templates. An attacker can access sensitive system information, such as configuration files, database passwords, or API keys, by crafting malicious placeholder names and injecting them into email subjects or bodies.

Note: Exploitation requires the attacker to have control over email templates or to influence buyer-controlled placeholders.

CVSS Base Scores

version 4.0
version 3.1