The plugin does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Create/edit a form and put the following payload in the Description: The XSS will be triggered in Manage Forms dashboard as well as in page/post where the form is embed (and there is at least one field in the form)