Go to https://croptool.toolforge.org/?site=<script>alert()</script>&title=Oculus+Quest+II+(50844634326).jpg or https://croptool.toolforge.org/?site=commons.wikimedia.org&title=<script>alert()</script> and view the numerous alert popups.
Furthermore, I was able to create a proof of concept URL which when clicked, would result in a file being uploaded or overwritten. This could potentially also be exploited to overwrite a highly in-use file when clicked by a user with sysop permissions, vandalizing highly visible pages.