A XSS payload in JS context was discovered by @thelilnix for WAF bypass. The payload used is ''.replace.call`1${/…/}${alert}`. This bypass can affect various WAF vendors. It is recommended to apply appropriate security measures to prevent such bypasses.