A Host Header Injection vulnerability in the password reset component in levlaz braindump v0.4.14 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME.
History

Fri, 24 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Braindump
Braindump braindump
Vendors & Products Braindump
Braindump braindump

Thu, 23 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-620
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Description A Host Header Injection vulnerability in the password reset component in levlaz braindump v0.4.14 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-10-23T00:00:00.000Z

Updated: 2025-10-23T16:37:24.569Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61132

cve-icon Vulnrichment

Updated: 2025-10-23T16:37:18.041Z

cve-icon NVD

Status : Received

Published: 2025-10-23T15:15:44.080

Modified: 2025-10-23T17:15:39.823

Link: CVE-2025-61132

cve-icon Redhat

No data.