The plugin does not sanitise and escape the query param ricerca before outputting it in an admin panel, allowing unauthenticated attackers to trick a logged in admin to trigger a XSS payload by clicking a link.
http://example.com/wp-admin/admin.php?page=cloud-gestione-files&ricerca=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E