The plugin does not escape the “CSS Class to target” setting before outputting it in an attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
With the Advanced Mode enabled, put the following payload in the “CSS Class to target” setting: ">