The plugin does not sanitize and escapes some parameters, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.
1. Add a new post and add the payload there: [evp_embed_video url='" onerror=alert(/XSS/) "']
2. Preview the post, and the XSS will trigger.