A tweet was found with an XSS bypass payload. The payload used is <A HRef=" AutoFocus OnFocus=top/**/?.['al'%2B'ert'](1)>. This payload can potentially bypass a WAF. Further analysis is needed to determine the specific WAF vendor affected and the effectiveness of the bypass.
For more insights, check out the original tweet here: https://twitter.com/smartpentesters/status/1787417727780467079. And don’t forget to follow @smartpentesters for more exciting updates in the world of cybersecurity.