Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
1. In the settings of the plugin, enter the following value in "Product Key". The value is: `"><svg/onload=alert('xss')>`
2. Click the 'Save Changes' button on the page.
3. Refresh or re-enter the page and move the mouse over the input box to get the XSS trigger.