diff --git a/http/cves/2023/CVE-2023-27641.yaml b/http/cves/2023/CVE-2023-27641.yaml
new file mode 100644
index 0000000000..1f2791e33e
--- /dev/null
+++ b/http/cves/2023/CVE-2023-27641.yaml
@@ -0,0 +1,53 @@
+id: CVE-2023-27641
+
+info:
+ name: L-Soft LISTSERV 16.5 - Cross-Site Scripting
+ author: ritikchaddha
+ severity: medium
+ description: |
+ The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL.
+ impact: |
+ Successful exploitation could lead to unauthorized access or data theft.
+ remediation: |
+ Update to the latest version of L-Soft LISTSERV to mitigate the XSS vulnerability.
+ reference:
+ - https://github.com/hosakauk/exploits/blob/master/listserv_report_xss.MD
+ - https://nvd.nist.gov/vuln/detail/CVE-2023-27641
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
+ cve-id: CVE-2023-27641
+ cwe-id: CWE-79
+ epss-score: 0.00068
+ epss-percentile: 0.28723
+ cpe: cpe:2.3:a:lsoft:listserv:*:*:*:*:*:*:*:*
+ metadata:
+ vendor: lsoft
+ product: listserv
+ shodan-query: http.html:"LISTSERV"
+ fofa-query: body="listserv"
+ tags: cve2023,cve,xss,listserv,edb,lsoft
+
+http:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wa.exe?REPORT&z=4&">a=1'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - '>'
+ - 'LISTSERV'
+ case-insensitive: true
+ condition: and
+
+ - type: word
+ part: content_type
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200