A XSS payload in JS context was discovered by @thelilnix for WAF bypass. The payload used is ''.replace.call`1${/…/}${alert}`. This bypass can affect various WAF vendors. It is recommended to apply appropriate security measures to prevent such bypasses.
A XSS payload in JS context for WAF bypass, by @thelilnix
''.replace.call`1${/…/}${alert}`
— XSS Payloads (@XssPayloads) April 17, 2025