Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-5600

CVE-2026-5600: Pretix Information Disclosure Vulnerability

CVE-2026-5600 is an information disclosure vulnerability in pretix 2025 that exposes check-in data across all events under an organizer. This article covers technical details, affected versions, impact, and mitigation.

Published: April 10, 2026

CVE-2026-5600 Overview

A new API endpoint introduced in pretix 2025 that is supposed to return all check-in events of a specific event in fact returns all check-in events belonging to the respective organizer. This authorization bypass vulnerability allows an API consumer to access information for all other events under the same organizer, even those they should not have access to.

The exposed records contain information on the time and result of every ticket scan as well as the ID of the matched ticket, including fields such as id, successful, error_reason, position, datetime, list, device, and type.

Critical Impact

API consumers can access check-in data across all events under an organizer, potentially exposing sensitive event attendance information and ticket scan records beyond their authorized scope.

Affected Products

  • Pretix 2025.x versions prior to 2026.3.1
  • Pretix installations using the affected check-in events API endpoint

Discovery Timeline

  • April 8, 2026 - CVE-2026-5600 published to NVD
  • April 8, 2026 - Last updated in NVD database

Technical Details for CVE-2026-5600

Vulnerability Analysis

This vulnerability is classified under CWE-653 (Improper Isolation or Compartmentalization) and represents a broken access control flaw in the pretix event ticketing platform. The affected API endpoint fails to properly scope its data retrieval query to the specific event the API consumer has access to, instead returning check-in records across all events belonging to the same organizer.

The vulnerability requires network access and high privileges (an authenticated API consumer), but allows unauthorized access to data from events outside the consumer's permission scope. While an unauthorized user typically cannot match the returned position IDs back to individual people without additional context, the exposure of check-in metadata (timestamps, success/failure status, device information) across multiple events represents a significant information disclosure concern for organizations hosting multiple events under a single organizer account.

Root Cause

The root cause stems from improper isolation in the API query logic. When the check-in events endpoint was introduced, the data retrieval function failed to properly filter results by the specific event ID the API consumer was authorized to access. Instead, the query scope was incorrectly set to the organizer level, returning all check-in records associated with any event under that organizer.

Attack Vector

An attacker with legitimate API access to one event under an organizer can exploit this vulnerability by simply querying the affected check-in events endpoint. The API will return check-in data for all events belonging to that organizer, regardless of the attacker's actual access permissions. This is a network-based attack that requires authenticated API access but no user interaction.

The vulnerability exposes JSON records containing check-in metadata such as timestamps, success status, ticket position IDs, check-in list references, and device identifiers for events the attacker should not have access to.

Detection Methods for CVE-2026-5600

Indicators of Compromise

  • Unusual API query patterns to check-in event endpoints with responses containing data from multiple events
  • API access logs showing single authenticated users retrieving disproportionately large check-in datasets
  • Requests to check-in endpoints returning event IDs that don't match the authorized event scope

Detection Strategies

  • Monitor API access logs for check-in endpoint queries that return data volumes inconsistent with single-event access
  • Implement alerting on API responses containing records with event references outside the requesting user's authorized scope
  • Audit API token permissions and compare against actual data access patterns

Monitoring Recommendations

  • Enable detailed logging for all check-in API endpoint requests including response sizes and event IDs returned
  • Implement rate limiting and anomaly detection on check-in data retrieval endpoints
  • Regularly audit API consumer access patterns against their authorized event scopes

How to Mitigate CVE-2026-5600

Immediate Actions Required

  • Upgrade pretix installations to version 2026.3.1 or later immediately
  • Audit API access logs to identify any potential unauthorized data access prior to patching
  • Review and restrict API token permissions to minimum necessary scope
  • Notify affected organizers if unauthorized cross-event data access is detected

Patch Information

Pretix has released version 2026.3.1 which addresses this vulnerability. Organizations running affected versions should update immediately. For more details, see the Pretix Blog Release Announcement.

Workarounds

  • Temporarily disable or restrict access to the affected check-in events API endpoint until patching is complete
  • Implement additional API gateway filtering to validate event scope in check-in endpoint responses
  • Use separate organizer accounts for events requiring strict data isolation between API consumers
bash
# Configuration example
# Upgrade pretix to patched version
pip install --upgrade pretix>=2026.3.1

# Verify installed version
pretix --version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechPretix

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-653
  • Technical References
  • Pretix Blog Release Announcement
  • Related CVEs
  • CVE-2026-2452: pretix Information Disclosure Vulnerability

  • CVE-2026-2451: pretix Information Disclosure Vulnerability

  • CVE-2026-2415: pretix Information Disclosure Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English