The plugin does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[image_over_image_vc ioi_caption_url=‘javascript:alert(/XSS/)’] [image_over_image_vc ioi_image_effect=‘" onmouseover=“alert(1)” style=“background:red;width:100px;height:100px;display:block;”’] Other affected attribute: ioi_url_target