Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
1. Navigate to: https://example.com/wp-admin/admin.php?page=better-follow-button-for-jetpack%2Fsettings.php
2. Add the payload to the "Main Button" field (other fields are likely vulnerable as well): "><script>alert(1)</script>
3. Click "Save Changes" and see the XSS.