A Host Header Injection vulnerability in the password reset component in levlaz braindump v0.4.14 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Braindump
Braindump braindump |
|
| Vendors & Products |
Braindump
Braindump braindump |
Thu, 23 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-620 | |
| Metrics |
cvssV3_1
|
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Host Header Injection vulnerability in the password reset component in levlaz braindump v0.4.14 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-23T00:00:00.000Z
Updated: 2025-10-23T16:37:24.569Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61132
Updated: 2025-10-23T16:37:18.041Z
Status : Received
Published: 2025-10-23T15:15:44.080
Modified: 2025-10-23T17:15:39.823
Link: CVE-2025-61132
No data.
ReportizFlow