A new XSS WAF bypass payload has been discovered for Akamai WAF. The payload is ';k='e'%0Atop['al'+k+'rt'](1)// '"><A HRef=" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>. Security researchers have found that this payload successfully bypasses Akamai WAF's protection. It is important for Akamai WAF users to be aware of this vulnerability and take necessary precautions to prevent XSS attacks.
For more insights, check out the original tweet here: https://twitter.com/ichigouchicha/status/1809088664313516094