No, changing the password does not pose any NEW threat. But if your current password is leaked or compromised, changing the password will NOT solve the issue. When changing the password, VeraCrypt does not truely change the encryption key(which will require full decryption with current key, and re-encryption). Instead, it simply changes the volume header. In short, the encrypted data stays nearly the same and the attacker could still have access to your data based on the compromised original password.
As someone replied in your other posts, PIM has nothing to do with passwords. It’s just another independent parameter for encryption. The argument that lower PIM matters when the password is below 20 (or any arbitrary number) characters does not mean that the PIM interferes with the password or the algorithm in any way. It is rather a speculation based on realistic calculations that long passwords itself has an entropy high enough that brute forcing is practically infeasible regardless of PIM value.
If your previous password was, eg.‘1234’, it could be easily brute forced.
However, changing the password would prevent such cases, although the encryption key remains essentially the same, which generally does not matter since brute force attacks do not brute force the raw “encryption keys” itself, but rather focus on the user password.