The developer filter the characters ', <, > and = and the vulnerability is something like:
I also tried URL encodes like %3c, %0a, %3e, %0a, %3d, %0a, %27 and %0a but it doesn't work. Without filters I can get XSS like ">alert("aaa").
Any ideas about how to bypass?