The premise of this challenge was similar to Hacker TS - we had input that was rendered into a PDF using wkhtmltopdf. However, our payload had to fit the following constraints:
name validated for alphanumeric characters
email uses RFC5322 validation
The email parameter is naturally more realistic to exploit, so I dived into RFC5322 and found the part that specified the allowed characters.
My teammate Enyei then found that this endpoint was also vulnerable to SSTI - it seems that the input is first rendered into a Jinja2 template before being passed to wkhtmltopdf.
The following will render the email as test@[49], for instance: