A Host Header Injection vulnerability in the password reset component in levlaz braindump v0.4.14 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flasks url_for(_external=True) generates reset links without a fixed SERVER_NAME.
When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication.