The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Put the following payload in any of text field settings of the plugin (such as 'Home Page Menu Label'): "><svg onload=alert(/XSS/)>
fuzzyap1
fuzzyap1
Yes
2022-02-21 (about 4 months ago)
2022-02-21 (about 4 months ago)
2022-04-12 (about 2 months ago)