The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Put the following payload in the "Client ID" settings: "/><img src=x onerror=alert(/XSS/)>
Vinay Varma Mudunuri, Krishna Harsha Kondaveeti
Vinay Varma Mudunuri
Yes
2022-06-21 (about 9 months ago)
2022-06-21 (about 9 months ago)
2022-06-21 (about 9 months ago)