There was an XSS flaw found in the wechall website.
Quote from kwisatz
index.php?mo=GWF&me=<script>alert(1)</script>&ajax=1
was prone to XSS.
The ajax=1 parameter turned everything vulnerable to XSS, because the content type is plaintext(no htmlspecialchars), but the header was missing.(content-type:text/plain).
I want to thank
kwisatz for finding and reporting this flaw which affects pretty all of my websites :^)
Greetings
gizmore