A reflected XSS vulnerability was discovered in the library section of a website, where book names can be searched. The bypass payload <script>alert('XSS bypassed')</script> was successfully used to bypass the WAF. This vulnerability could allow an attacker to execute malicious scripts on the targeted website. It is important for website owners to patch this vulnerability immediately to prevent potential attacks.
Original tweet: https://twitter.com/am1rw4ck3r/status/1806306142013759595