An XSS bypass was discovered for Akamai WAF. The bypass payload consists of a crafted input field that executes JavaScript code when the user interacts with it. This vulnerability allows an attacker to execute malicious scripts on the target website. For more details, visit the blogpost by @smaury92.
For more details, check out the original tweet here: https://twitter.com/XssPayloads/status/1770300261522616458