The plugin does not escape and sanitize the some of its settings, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfiltered_html is disallowed
Put the following payload on the "Menu Name" settings of the plugin: "onmouseover=alert("XSS")//