The plugin does not escape the "CSS Class to target" setting before outputting it in an attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
With the Advanced Mode enabled, put the following payload in the "CSS Class to target" setting: "><script>alert(/XSS/)</script>
Shivam Rai
Shivam Rai
Yes
2022-01-03 (about 1 years ago)
2022-01-03 (about 1 years ago)
2022-04-16 (about 9 months ago)