The plugin does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Add the "EDD Buy Button" Gutenberg block to a post and put the payload below in the "Additional CSS class(es)" advanced block settings:
" onmouseover="alert(/XSS/)" style="background:red;"
Note: At least one Download need to exist for the issue to trigger.