Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as Editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
1. Go to "Popup4Phone > Settings > Form"
2. In the "Message for show during form submission" field add the payload `</textarea><script>alert(/XSS: popup4phone_form_message_sending/)</script>`
3. Save the changed and view the form on the frontend to see the XSS