The plugin does not sanitise and escape Advert Names which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Create/edit an Advert and put the following payload in the Name field: "><img src=x onerror=alert(/XSS/)>
The XSS will be triggered when accessing the Manage Adverts page