As an unauthenticated user access a form containing a File Upload form.

Upload a malicious html file (containing a malicious js for example) named after an image file, for example, and intercept the request.

Change the filename's extension in the request to html and forward the request.

The malicious HTML will be available on the uploads directory.