A payload to bypass Cloudflare WAF for XSS vulnerability was shared by @KN0X55. The payload <Img/Src/OnError=(alert)(1)> can be used to trigger an alert function. This bypass takes advantage of the way Cloudflare WAF handles image source tags with an onerror attribute, allowing the execution of arbitrary JavaScript code. Website owners using Cloudflare WAF should be aware of this vulnerability and ensure proper mitigation measures are in place.
A payload to bypass CloudFlare WAF, by @KN0X55
<Img/Src/OnError=(alert)(1)>— XSS Payloads (@XssPayloads) January 21, 2025