The tweet mentions the detection of SSTI template injection using Nunjucks template but the tool did not detect it. The payload used is 403. It indicates that there might be a WAF (Web Application Firewall) in place preventing the exploitation. Further analysis and testing are recommended to bypass the WAF and successfully exploit the SSTI vulnerability. #bugbountytips #bugcrowd @xss2rcs ???
Original tweet: https://twitter.com/Fighter00192814/status/1832610681365131428