Safety vulnerability ID: 72971
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Stored XSS vulnerabilities in the organizer and event settings of Pretix affected versions allowed malicious event organizers to inject HTML tags into email previews on the settings page. The fix introduced proper escaping of placeholders and dynamic content using Django's `escape` function, mitigating the risk of Cross-Site Scripting (XSS) attacks. While the default Content Security Policy (CSP) of Pretix prevents the execution of attacker-provided scripts, making exploitation unlikely, this vulnerability could still be dangerous if combined with a CSP bypass, potentially allowing impersonation of other organizers or staff users.
Latest version: 2024.11.0
Reinventing presales, one ticket at a time
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application