A new XSS WAF bypass for Cloudflare has been discovered by xss0r. The payload used for bypass is <details open ontoggle=alert('xss0r')>. This bypass affects Cloudflare WAF. Users can test their XSS skills by visiting https://cf.wezoom.ca/?payload= and triggering the bypass.
For more details, check out the original tweet here: https://twitter.com/xss0r/status/1861507013353640181