{"id":"CVE-2019-25262","details":"A security vulnerability has been detected in elinicksic Razgover up to db37dfc5c82f023a40f2f7834ded6633fb2b5262. This affects an unknown part of the file Chattify/send.php of the component Chat Message Handler. Such manipulation of the argument msg leads to cross site scripting. The attack may be performed from remote. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The name of the patch is 995dd89d0e3ec5522966724be23a5d58ca1bdac3. Applying a patch is advised to resolve this issue. This vulnerability only affects products that are no longer supported by the maintainer.","modified":"2026-03-14T03:46:30.041694Z","published":"2025-12-31T17:15:41.670Z","references":[{"type":"WEB","url":"https://vuldb.com/?ctiid.338649"},{"type":"WEB","url":"https://vuldb.com/?id.338649"},{"type":"FIX","url":"https://github.com/elinicksic/Razgover/commit/995dd89d0e3ec5522966724be23a5d58ca1bdac3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/elinicksic/razgover","events":[{"introduced":"0"},{"fixed":"995dd89d0e3ec5522966724be23a5d58ca1bdac3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-25262.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"}]}