CWE-627

Dynamic Variable Evaluation

4 CVEs Avg CVSS 7.2 MITRE
1
CRITICAL
0
HIGH
3
MEDIUM
0
LOW
1
POC
0
KEV

Monthly

CVE-2026-2452 MEDIUM PATCH This Month

Information disclosure in Pretix email template processing allows authenticated backend users to extract sensitive system data including database credentials and API keys through specially crafted placeholder syntax that bypasses existing validation controls. An attacker with email template editing permissions can leverage this vulnerability to access confidential configuration information from the system. A patch is available to address the ineffective placeholder sanitization mechanism.

Information Disclosure Pretix Newsletters
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-2451 MEDIUM This Month

Information disclosure in Pretix email template processing allows authenticated backend users to extract sensitive system data including database credentials and API keys through specially crafted placeholder syntax that bypasses existing security controls. An attacker with email template modification privileges can leverage Python object introspection to access arbitrary system configuration details. No patch is currently available for this vulnerability affecting Pretix and its Double Opt In Step extension.

Information Disclosure Pretix Double Opt In Step
NVD VulDB
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-2415 MEDIUM PATCH This Month

Pretix email template placeholder injection enables authenticated backend users to extract sensitive system information such as database credentials and API keys through specially crafted placeholder syntax that bypasses insufficient input validation. An attacker with backend access can leverage this vulnerability to enumerate system configuration details and potentially compromise infrastructure security. No patch is currently available for this medium-severity issue affecting Pretix installations.

Information Disclosure Pretix
NVD VulDB
CVSS 3.1
5.9
EPSS
0.1%
CVE-2024-8953 CRITICAL POC PATCH Act Now

In composiohq/composio version 0.4.3, the mathematical_calculator endpoint uses the unsafe eval() function to perform mathematical operations. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

RCE Composio
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-2452
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Information disclosure in Pretix email template processing allows authenticated backend users to extract sensitive system data including database credentials and API keys through specially crafted placeholder syntax that bypasses existing validation controls. An attacker with email template editing permissions can leverage this vulnerability to access confidential configuration information from the system. A patch is available to address the ineffective placeholder sanitization mechanism.

Information Disclosure Pretix Newsletters
NVD
CVE-2026-2451
EPSS 0% CVSS 6.5
MEDIUM This Month

Information disclosure in Pretix email template processing allows authenticated backend users to extract sensitive system data including database credentials and API keys through specially crafted placeholder syntax that bypasses existing security controls. An attacker with email template modification privileges can leverage Python object introspection to access arbitrary system configuration details. No patch is currently available for this vulnerability affecting Pretix and its Double Opt In Step extension.

Information Disclosure Pretix Double Opt In Step
NVD VulDB
CVE-2026-2415
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Pretix email template placeholder injection enables authenticated backend users to extract sensitive system information such as database credentials and API keys through specially crafted placeholder syntax that bypasses insufficient input validation. An attacker with backend access can leverage this vulnerability to enumerate system configuration details and potentially compromise infrastructure security. No patch is currently available for this medium-severity issue affecting Pretix installations.

Information Disclosure Pretix
NVD VulDB
CVE-2024-8953
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

In composiohq/composio version 0.4.3, the mathematical_calculator endpoint uses the unsafe eval() function to perform mathematical operations. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

RCE Composio
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy