The plugin does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin.
Make a logged in admin open the following URL:
https://examle.com/wp-admin/admin.php?page=gf_edit_forms&s=vulnerable&"><script>alert(/XSS/)</script>=2