Cloudflare XSS WAF Bypass: A bypass payload was discovered by @nav1n0x targeting Cloudflare WAF. The payload %2Bself[%2F*foo*%2F'alert'%2F*bar*%2F](self[%2F*foo*%2F'document'%2F*bar*%2F]['domain'])%2F%2F was used to bypass the XSS protection. This highlights a potential security vulnerability that could impact the effectiveness of Cloudflare WAF. For more technical details, visit @nav1n0x's page. #cybersec #bugbountytips #infosec
Check out the original tweet here: https://twitter.com/HackingTeam777/status/1853688315230236832