The plugin does not validate and escape some of its query parameters before outputting them back in a page/post via an embedded shortcode, which could allow an attacker to inject javascript into into the site via a crafted URL.
Create a page "Test" containing the shortcode "[loancomparison]", then visit the page like this:
https://example.com/test/?amount="//><script>alert(1)</script><span