What if a simple image upload could let attackers take over your account? In this episode, we break down a clever exploit where hackers bypassed security controls, injected malicious JavaScript, and exfiltrated data - all while staying under the radar. From dodging CSP to abusing internal chat functions, this attack is a masterclass in chaining vulnerabilities. Tune in as we unravel how it happened and what defenders can learn from it.